Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines
International Business Machines Corp
International Business Machines Coporation
International Business Machiness Corporation
International Business Machines Corporations
International Business Machines Corportion
International Business Machines Incorporated
International Business Machines Cororation
International Business Machines Inc
International Business Machines Corporaton
International Business Machines Corporaiton
International Business Machines Corproation
International Business Machines Coproration
International Business Machines Corportation
International Business Machines Corpration
International Business Machines Corpoation
International Business Machines Corporation ibm
International Business Machines Corporatin
International Business Machines Corporaion
International Business Machines Company
International Business Machines Corporation yt
International Business Machines Corpporation
International Business Machines Croporation
International Business Machines corporation
  

International Business Machines patents (2016 archive)

Recent patent applications related to International Business Machines. International Business Machines is listed as an Agent/Assignee. Note: International Business Machines may have other listings under different names/spellings. We're not affiliated with International Business Machines, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machines-related inventors




Date International Business Machines patents (2016 archive) (updated weekly) - BOOKMARK this page
01/07/16Providing a regional channel in a digital broadcast environment
04/28/16Intelligent meeting enhancement system
01/14/16Enhancing presentation content delivery associated with a presenation event
04/14/16Level shifting an i/o signal into multiple voltage domains
12/22/16Data quality management using business process modeling
03/17/16Logical data shuffling
01/21/16Networked high availability and redundancy among vending devices
06/09/16Network security processing
05/19/16Influence personal benefit from dynamic user modeling matching with natural language statements in reviews
12/29/16Antimicrobial polymers formed by bulk polyaddition
12/29/16Prosthetic device control with a wearable device
12/29/16Multiple user single avatar video game input system
12/29/16Butadiene sequestration via sulfur dioxide charged zeolite beds
12/29/16Butadiene sequestration via sulfur dioxide charged zeolite beds
12/29/16Polylactic acid (pla) with low moisture vapor transmission rates by grafting through of hydrophobic polymers directly to pla backbone
12/29/16Polymer comprising mesoporous flame retardant
12/29/16Bypassing a removed element in a liquid cooling system
12/29/16Airborne particulate source detection system
12/29/16Airborne particulate source detection system
12/29/16Electronic roll pitch and yaw sensor using conductive fluid
12/29/16Quantifying anomalous behavior by identifying anomalies at subtrajectories
12/29/16Cognitive needs-based trip planning
12/29/16Cognitive needs-based trip planning
12/29/16Carbon based cmos sensor ring oscillator
12/29/16Non-permanent termination structure for microprobe measurements
12/29/16Non-permanent termination structure for microprobe measurements
12/29/16On-chip combined hot carrier injection and bias temperature instability monitor
12/29/16Integrated circuit chip reliability qualification using a sample-specific expected fail rate
12/29/16Efficiency of cycle-reproducible debug processes in a multi-core environment
12/29/16Mems based photonic devices and methods for forming
12/29/16Multilevel waveguide structure
12/29/16Single-mode polymer waveguide connector
12/29/16Single-mode polymer waveguide connector
12/29/16Collaborative adjustment of resources within a managed environment
12/29/16Prosthetic device control with a wearable device
12/29/16Active perforation for advanced server cooling
12/29/16Failure recovery of distributed control of power and thermal management
12/29/16Clustering execution in a processing system to increase power savings
12/29/16Validating power paths to it equipment
12/29/16Clustering execution in a processing system to increase power savings
12/29/16Rotating ring for device control
12/29/16Mobile application interaction guide via tactile feedback
12/29/16Dynamic alteration of input device parameters based on contextualized user model
12/29/16Mobile application interaction guide via tactile feedback
12/29/16Rotating ring for device control
12/29/16Usability improvements for visual interfaces
12/29/16Screen reader improvements
12/29/16Moving an object displayed on a display screen
12/29/16Reconfiguring a user interface according to interface device deterioration
12/29/16Automated testing of gui mirroring
12/29/16Reconfiguring a user interface according to interface device deterioration
12/29/16Moving an object displayed on a display screen
12/29/16Inferring insights from enhanced user input
12/29/16Selective write control
12/29/16Reducing stress on raids under rebuild
12/29/16Non-volatile memory drive partitions within microcontrollers
12/29/16Adaptive storage-aware multipath management
12/29/16Non-volatile memory drive partitions within microcontrollers
12/29/16Security checks for proxied requests
12/29/16Reusing a duplexed storage resource
12/29/16Silent store detection and recording in memory storage
12/29/16Performing preprocessing operations in anticipation of log file writes
12/29/16Performing post-processing operations for log file writes
12/29/16Host-side acceleration for improved storage grid performance
12/29/16Performance of virtual machine fault tolerance micro-checkpointing using transactional memory
12/29/16Silent store detection and recording in memory storage
12/29/16Data access to a storage tier on a client in a multi-tiered storage system
12/29/16Managing a set of blocks in a storage system
12/29/16Address probing for transaction
12/29/16Low power storage array with metadata access
12/29/16Affinity-aware parallel zeroing of memory for initialization of large pages in non-uniform memory access (numa) servers
12/29/16Reusing a duplexed storage resource
12/29/16Shifting a defrag operation in a mirrored system
12/29/16Rebalancing data storage in a dispersed storage network
12/29/16Affinity-aware parallel zeroing of pages in non-uniform memory access (numa) servers
12/29/16Off-line affinity-aware parallel zeroing of memory in non-uniform memory access (numa) servers
12/29/16Affinity-aware parallel zeroing of memory in non-uniform memory access (numa) servers
12/29/16Silent store detection and recording in memory storage
12/29/16Scheduling storage unit maintenance tasks in a dispersed storage network
12/29/16Systems management based on semantic models and low-level runtime state
12/29/16Selective notifications according to merge distance for software version branches within a software configuration management system
12/29/16Conversion of boolean conditions
12/29/16Instruction to perform a logical operation on conditions and to quantize the boolean result of that operation
12/29/16Conversion of boolean conditions
12/29/16Instruction to perform a logical operation on conditions and to quantize the boolean result of that operation
12/29/16Non-default instruction handling within transaction
12/29/16Instructions to count contiguous register elements having specific values
12/29/16Efficient quantization of compare results
12/29/16Efficient quantization of compare results
12/29/16Register file mapping
12/29/16Split-level history buffer in a computer processing unit
12/29/16Split-level history buffer in a computer processing unit
12/29/16Techniques to wake-up dependent instructions for back-to-back issue in a microprocessor
12/29/16Techniques to wake-up dependent instructions for back-to-back issue in a microprocessor
12/29/16System operation queue for transaction
12/29/16Jni object access
12/29/16Automated testing of gui mirroring
12/29/16Adjusting virtual machine migration plans based on alert conditions related to future migrations
12/29/16Automated test optimization
12/29/16Performance of virtual machine fault tolerance micro-checkpointing using transactional memory
12/29/16Adjusting virtual machine migration plans based on alert conditions related to future migrations
12/29/16Migrating virtual machines based on relative priority of virtual machine in the context of a target hypervisor environment
12/29/16Multithreaded transactions
12/29/16Address probing for transaction
12/29/16Multithreaded transactions
12/29/16Intellective switching between tasks
12/29/16Optimization of application workflow in mobile embedded devices
12/29/16Generating timing sequence for activating resources linked through time dependency relationships
12/29/16Job distribution within a grid environment
12/29/16Job distribution within a grid environment
12/29/16Runtime fusion of operators
12/29/16Management of asynchronous and synchronous resource requests
12/29/16Optimizing the initialization of a queue via a batch operation
12/29/16Scalable rcu callback offloading
12/29/16Efficiency of cycle-reproducible debug processes in a multi-core environment
12/29/16Validating system registry files in a dispersed storage network
12/29/16File level defined de-clustered redundant array of independent storage devices solution
12/29/16Alternative port error recovery with limited system impact
12/29/16Failure recovery of distributed control of power and thermal management
12/29/16Risk formula for erroneous software components detection
12/29/16Reverse resynchronization by a secondary data source when a data destination has more recent data
12/29/16Efficiency of cycle-reproducible debug processes in a multi-core environment
12/29/16Flexible configuration and control of a testing system
12/29/16Validating power paths to it equipment
12/29/16Testing functional correctness and idempotence of software automation scripts
12/29/16Evaluating user interface usability for task completion
12/29/16Creating software performance testing environment based on virtual machine
12/29/16Flexible configuration and control of a testing system
12/29/16Generating data tables
12/29/16Dynamic ranking of performance issues for applications
12/29/16Testing functional correctness and idempotence of software automation scripts
12/29/16Optimizing performance of tiered storage
12/29/16Non-default instruction handling within transaction
12/29/16Hybrid tracking of transaction read and write sets
12/29/16Hybrid tracking of transaction read and write sets
12/29/16Hybrid tracking of transaction read and write sets
12/29/16System operation queue for transaction
12/29/16Client voting-inclusive in-memory data grid (imdg) cache management
12/29/16Multiple window based segment prefetching
12/29/16Dynamic structural management of a distributed caching infrastructure
12/29/16Hybrid tracking of transaction read and write sets
12/29/16Generating data tables
12/29/16Page compression strategy for improved page out process
12/29/16Management of allocation for alias devices
12/29/16Non-interfering transactions
12/29/16Management of allocation for alias devices
12/29/16Lock-free processing of stateless protocols over rdma
12/29/16Geo-cultural information based dynamic character variant rendering
12/29/16Geo-cultural information based dynamic character variant rendering
12/29/16Verifying content of resources in markup language documents
12/29/16Method and apparatus for intelligent capture of document object model events
12/29/16Managing a domain specific ontology collection
12/29/16Editing one or more text files from an editing session for an associated text file
12/29/16Editing one or more text files from an editing session for an associated text file
12/29/16Fast query processing in columnar databases with gpus
12/29/16Fast query processing in columnar databases with gpus
12/29/16Identification of life events within social media conversations
12/29/16Maintaining versions of data in solid state memory
12/29/16Free space management in a database
12/29/16Log file analysis to locate anomalies
12/29/16Log file analysis to locate anomalies
12/29/16Query processing using a dimension table implemented as decompression dictionaries
12/29/16Database comparison system
12/29/16Database comparison system
12/29/16Aggregating and summarizing sequences of hierarchical records
12/29/16Efficient sorting of large data set with duplicate values
12/29/16Massive time series correlation similarity computation
12/29/16Reduction of bind breaks
12/29/16Granular buffering of metadata changes for journaling file systems
12/29/16Granular buffering of metadata changes for journaling file systems
12/29/16Expansion of a tree heirarchy
12/29/16Distributed processing of a search query with distributed posting lists
12/29/16Efficient sorting of large data set with duplicate values
12/29/16Query processing using a dimension table implemented as decompression dictionaries
12/29/16Distributed processing of a search query with distributed posting lists
12/29/16Visually indicating a calendar event among different time zones
12/29/16Data synchronization using redundancy detection
12/29/16Knowledge canvassing using a knowledge graph and a question and answer system
12/29/16Question and answer system emulating people and clusters of blended people
12/29/16Profile driven presentation content displaying and filtering
12/29/16System to store user selection and provide easy retrieval and traversal
12/29/16Aggregating and summarizing sequences of hierarchical records
12/29/16Modeling transistor performance considering non-uniform local layout effects
12/29/16Modeling localized temperature changes on an integrated circuit chip using thermal potential theory
12/29/16Applying random nets credit in an efficient static timing analysis
12/29/16Early overlay prediction and overlay-aware mask design
12/29/16Algebraic reconstruction of perturbed models of genetic populations
12/29/16Algebraic reconstruction of perturbed models of genetic populations
12/29/16Weak password support in a multi-user environment
12/29/16Self-repair and distributed-repair of applications
12/29/16Static security analysis using a hybrid representation of string values
12/29/16Masking sensitive data in mobile applications
12/29/16Pose detection using depth camera
12/29/16Determining user preferences for data visualizations
12/29/16Systems and methods for inferring gender by fusion of multimodal content
12/29/16Neuromorphic processing devices
12/29/16Knowledge canvassing using a knowledge graph and a question and answer system
12/29/16Provisioning service requests in a computer system
12/29/16Enhanced e-mail return receipts based on cognitive considerations
12/29/16Collaboration group recommendations derived from request-action correlations
12/29/16Software request-filtering predictive technique based on resource usage probabilities
12/29/16Cluster based desktop management services
12/29/16System and method for secure proximity-based signatures for parcel delivery
12/29/16Non-interfering transactions
12/29/16Privacy protection in ecommerce/logistics
12/29/16Targeted e-commerce business strategies based on affiliation networks derived from predictive cognitive traits
12/29/16Predicting project outcome based on comments
12/29/16Cross-device and cross-channel advertising and remarketing
12/29/16Prioritized advertising
12/29/16Dynamic generation of advertisement based upon user need
12/29/16Dynamic generation of advertisement based upon user need
12/29/16Product recommendations based on analysis of social experiences
12/29/16Targeted e-commerce business strategies based on affiliation networks derived from predictive cognitive traits
12/29/16Analysis of social data to match suppliers to users
12/29/16Application for automatic ordering of food items
12/29/16Product recommendations based on analysis of social experiences
12/29/16Identification of employees on external social media
12/29/16Behavioral and exogenous factor analytics based user clustering and migration
12/29/16Producing visualizations of elements in works of literature
12/29/16Reality augmentation to eliminate, or de-emphasize, selected portions of base image
12/29/16Wearable device for automatic detection of emergency situations
12/29/16Reference tokens for managing driverless cars
12/29/16Reference tokens for managing driverless cars
12/29/16Discovering windows in temporal predicates
12/29/16Training deep neural network for acoustic modeling in speech recognition
12/29/16Electrically non-conductive magnetic shield laminate structure for contact recording sensor
12/29/16Electrically conductive magnetic shield laminate structure for contact recording sensor
12/29/16Compound finfet device including oxidized iii-v fin isolator
12/29/16Tone inverted directed self-assembly (dsa) fin patterning
12/29/16Multiple nanosecond laser pulse anneal processes and resultant semiconductor structure
12/29/16Directed self-assembly
12/29/16Silicon germanium-on-insulator finfet
12/29/16Low resistance metal contacts to interconnects
12/29/16Hdp fill with reduced void formation and spacer damage
12/29/16Insulating a via in a semiconductor substrate
12/29/16Optimized wires for resistance or electromigration
12/29/16Metal level formation method and an integrated circuit structure having a metal level with improved dielectric to metal adhesion
12/29/16Low resistance metal contacts to interconnects
12/29/16Integrated circuits with self aligned contacts and methods of manufacturing the same
12/29/16Partial spacer for increasing self aligned contact process margins
12/29/16Finfet devices
12/29/16Finfet devices with multiple channel lengths
12/29/16Finfet devices
12/29/16Integrated circuit (ic) with offset gate sidewall contacts and method of manufacture
12/29/16Semiconductor device structure with 110-pfet and 111-nfet current flow direction
12/29/16Formation of strained fins in a finfet device
12/29/16Implementing resistance defect performance mitigation using test signature directed self heating and increased voltage
12/29/16Implementing resistance defect performance mitigation using test signature directed self heating and increased voltage
12/29/16Stable contact on one-sided gate tie-down structure
12/29/16Optimized wires for resistance or electromigration
12/29/16Finfet power supply decoupling
12/29/16Self aligned via in integrated circuit
12/29/16Interconnect structure including middle of line (mol) metal layer local interconnect on etch stop layer
12/29/16Wafer rigidity with reinforcement structure
12/29/16Self-destructive circuits under radiation
12/29/16Corrosion resistant aluminum bond pad structure
12/29/16Lateral bipolar sensor with sensing signal amplification
12/29/16Finfet structures having silicon germanium and silicon fins with suppressed dopant diffusion
12/29/16Semiconductor device structure with 110-pfet and 111-nfet curent flow direction
12/29/16Selective oxidation for making relaxed silicon germanium on insulator structures
12/29/16Contact formation to 3d monolithic stacked finfets
12/29/16Gate all-around finfet device and a method of manufacturing same
12/29/16Injection pillar definition for line mram by a self-aligned sidewall transfer
12/29/16Compound finfet device including oxidized iii-v fin isolator
12/29/16Finfet devices
12/29/16Iii-v gate-all-around field effect transistor using aspect ratio trapping
12/29/16Nanowire semiconductor device including lateral-etch barrier region
12/29/16Extrinsic base doping for bipolar junction transistors
12/29/16Finfet devices having silicon germanium channel fin structures with uniform thickness
12/29/16Replacement metal gate structures
12/29/16Method of forming field effect transistors (fets) with abrupt junctions and integrated circuit chips with the fets
12/29/16Method to improve reliability of replacement gate device
12/29/16Hdp fill with reduced void formation and spacer damage
12/29/16Nanowire semiconductor device including lateral-etch barrier region
12/29/16Field effect transistors with strained channel features
12/29/16High voltage finfet structure with shaped drift region
12/29/16Iii-v gate-all-around field effect transistor using aspect ratio trapping
12/29/16Thin film photovoltaic cell with back contacts
12/29/16Ohmic contact of thin film solar cell
12/29/16Thin film photovoltaic cell with back contacts
12/29/16Iii-v solar cell structure with multi-layer back surface field
12/29/16Perpendicular magnetic anisotropy free layers with iron insertion and oxide interfaces for spin transfer torque magnetic random access memory
12/29/16Self-aligned carbon nanotube transistor including source/drain extensions and top gate
12/29/16Self-aligned carbon nanotube transistor including source/drain extensions and top gate
12/29/16Organic monolayer passivation and silicon heterojunction photovoltaic devices using the same
12/29/16Organic monolayer passivation and silicon heterojunction photovoltaic devices using the same
12/29/16Coupling mobile devices for tetherless charging or communication
12/29/16Tetherless device charging for chained devices
12/29/16Tetherless device charging for chained devices
12/29/16Driving the common-mode of a josephson parametric converter using a three-port power divider
12/29/16Temperature stabilization of an on-chip temperature-sensitive element
12/29/16Rerouting bus data signals from faulty signal carriers to existing healthy signal carriers
12/29/16Codeword synchronization for fiber channel protocol
12/29/16Distributed computing utilizing homomorphic encryption
12/29/16Identifying performance-degrading hardware components in computer storage systems
12/29/16Application hierarchy specification with real-time functional selection
12/29/16Assessing computing environment changes using specification documents
12/29/16Transactional orchestration of resource management and system topology in a cloud environment
12/29/16Efficient parallel processing of a network with conflict constraints between nodes
12/29/16Data synchronization using redundancy detection
12/29/16Method for determining system topology graph changes in a distributed computing system
12/29/16Rerouting bus data signals from faulty signal carriers to existing healthy signal carriers
12/29/16Predictive vpn bandwidth balancing based on weather data and social media sentiment
12/29/16Transactional orchestration of resource management and system topology in a cloud environment
12/29/16Dynamically generating solution stacks
12/29/16Establishing sender identities in synchronous and asynchronous communications
12/29/16Handling various scenarios where an email recipient is not available
12/29/16Collecting messages from a group chat window that mention a specific user
12/29/16Collecting messages from a group chat window that mention a specific user
12/29/16Mention identification for untrusted content
12/29/16Handling various scenarios where an email recipient is not available
12/29/16Host state-sensing for message interruption
12/29/16System and method for detecting expertise via meeting participation
12/29/16System for post self awareness
12/29/16Identification of employees on external social media
12/29/16Communication message consolidation with content difference fomatting
12/29/16Communication message consolidation with content difference fomatting
12/29/16Real-time agreement analysis
12/29/16Mention identification for untrusted content
12/29/16Distributed computing utilizing homomorphic encryption
12/29/16Protecting sensitive data in a security area
12/29/16Method, system, and program product for remotely attesting to a state of a computer system
12/29/16Method, system, and program product for remotely attesting to a state of a computer system
12/29/16Combined key security
12/29/16User managed access scope specific obligation policy for authorization
12/29/16End point reputation credential for controlling network access
12/29/16Installing virtual machines within different communication pathways to access protected resources
12/29/16Installing virtual machines within different communication pathways to access protected resources
12/29/16Managing data privacy and information safety
12/29/16Real-time agreement analysis
12/29/16Risk assessment of open wi-fi networks
12/29/16Managing data privacy and information safety
12/29/16Controlling access to categorized messages
12/29/16Activity-based risk selection of open wi-fi networks
12/29/16Relationship-centric portals for communication sessions
12/29/16Guiding a desired outcome for an electronically hosted conference
12/29/16Optimizing routing and load balancing in an sdn-enabled cloud during enterprise data center migration
12/29/16Runtime fusion of operators
12/29/16Sysplexport allocation across a z/os sysplex
12/29/16Management of asynchronous and synchronous resource requests
12/29/16Dynamically generating solution stacks
12/29/16Method, apparatus, and software for identifying a set of options for the provision of a service
12/29/16Managing file changes made during a review process
12/29/16Optimizing storage in a publish / subscribe environment
12/29/16Managing contact status updates in a presence management system
12/29/16Data prefetching for large data systems
12/29/16Micro cloud image uploading
12/29/16De-duplicating remote procedure calls
12/29/16Coupling mobile devices for tetherless charging or communication
12/29/16Mobile management framework
12/29/16Data analysis system with movement patterns for medical wellness correlation
12/29/16Data analysis system with movement patterns for medical wellness correlation
12/29/16Tagging geographical areas
12/29/16Controlling mobile device access with a paired device
12/29/16Beacon array
12/29/16Beacon array
12/29/16Managing contact status updates in a presence management system
12/29/16Active perforation for advanced server cooling
12/29/16Bypassing a removed element in a liquid cooling system
12/22/16Fabrication of a microfluidic chip package or assembly with separable chips
12/22/16Fabrication of microfluidic chips having electrodes level with microchannel walls
12/22/16Microfluidic chip with dielectrophoretic electrodes extending in hydrophilic flow path
12/22/16Method of glass fabric production including resin adhesion for printed circuit board formation
12/22/16Method of glass fabric production including resin adhesion for printed circuit board formation
12/22/16Floor covering having adjustable hardness
12/22/16Geographic space management
12/22/16Geographic space management
12/22/16Geographic space management
12/22/16Geographic space management
12/22/16Geographic space management
12/22/16Transport option selection to serve well-being objectives
12/22/16Floor covering having adjustable hardness
12/22/16Capacitive measurements of divots in semiconductor devices
12/22/16Generating fine resolution air pollution estimates
12/22/16Generating fine resolution air pollution estimates
12/22/16Air-pollution anomaly location mechanism
12/22/16Synaptic electronic devices with electrochromic device
12/22/16Synaptic electronic devices with electrochromic device
12/22/16Fingerprint directed screen orientation
12/22/16Managing the presentation of elements via a user interface of a computing device.
12/22/16Automated electronic message filing system
12/22/16Adjusting appearance of icons in an electronic device
12/22/16Memory-aware matrix factorization
12/22/16Assigning device adaptors to use to copy source extents to target extents in a copy relationship
12/22/16Implementing multiple raid level configurations in a data storage device
12/22/16Processing read and write requests
12/22/16Secured multi-tenancy data in cloud-based storage environments
12/22/16Virtual accounting container for supporting small volumes of data
12/22/16Point in time copy technique using a block level of granularity
12/22/16Selective memory dump using usertokens
12/22/16Virtual accounting container for supporting small volumes of data
12/22/16Virtual accounting container for supporting small volumes of data
12/22/16Feature exploitation evaluator
12/22/16Feature exploitation evaluator
12/22/16Correcting non-compliant source code in an integrated development environment
12/22/16Split-level history buffer in a computer processing unit
12/22/16Split-level history buffer in a computer processing unit
12/22/16Techniques for improving issue of instructions with variable latencies in a microprocessor
12/22/16Techniques for improving issue of instructions with variable latencies in a microprocessor
12/22/16Dynamic code injection
12/22/16Geographic space management
12/22/16Managing a set of assets of a shared pool of configurable computing resources
12/22/16Scheduling mapreduce jobs in a cluster of dynamically available servers
12/22/16Transactional lock elision with delayed lock checking
12/22/16Data storage device control with power hazard mode
12/22/16Securing data in a dispersed storage network
12/22/16Slice rebuilding in a dispersed storage network
12/22/16Converting volatile memory module devices to flashless non-volatile memory module devices
12/22/16Multi-site disaster recovery consistency group for heterogeneous systems
12/22/16Synchronization and order detection in a memory system
12/22/16Maintaining two-site configuration for workload availability between sites at unlimited distances for products and services
12/22/16Analysis system, analysis method and program
12/22/16Stream-based breakpoint for too many tuple creations
12/22/16Stream-based breakpoint for too many tuple creations
12/22/16Caching policies for selection and replacement of objects
12/22/16Priority level adaptation in a dispersed storage network
12/22/16Font personalization
12/22/16Reconciliation of transcripts
12/22/16Optimizing update operations in hierarchically structured documents
12/22/16Domain specific representation of document text for accelerated natural language processing
12/22/16Building and maintaining information extraction rules
12/22/16Collaboratively reconstituting tables
12/22/16Augmented text search with syntactic information
12/22/16Disambiguation in concept identification
12/22/16Augmented text search with syntactic information
12/22/16Domain specific representation of document text for accelerated natural language processing
12/22/16Identification of target audience for content delivery in social networks by quantifying semantic relations and crowdsourcing
12/22/16Defining dynamic topic structures for topic oriented question answer systems
12/22/16Geographic space management
12/22/16Geographic space management
12/22/16Control of web content tagging
12/22/16Prioritization of e-mail files for migration
12/22/16Detection of data affected by inaccessible storage blocks in a deduplication system
12/22/16Removal of reference information for storage blocks in a deduplication system
12/22/16Geographic space management
12/22/16Back referencing of deduplicated data
12/22/16Document order management via relaxed node indexing
12/22/16Geographic space management
12/22/16Geographic space management
12/22/16Partition access method for query optimization
12/22/16Partition access method for query optimization
12/22/16Partitioned join with dense inner table representation
12/22/16Preprocessing heterogeneously-structured electronic documents for data warehousing
12/22/16Conversion of forms of user data segment ids in a deduplication system
12/22/16Document order management via relaxed node indexing
12/22/16Using ontologies to comprehend regular expressions
12/22/16Defining dynamic topic structures for topic oriented question answer systems
12/22/16Routing of nets of an integrated circuit
12/22/16Result caching for improving statistical efficiency of composite simulation models
12/22/16Integrated circuit chip reliability using reliability-optimized failure mechanism targeting
12/22/16Signal via positioning in a multi-layer circuit board
12/22/16Signal via positioning in a multi-layer circuit board
12/22/16Routing of nets of an integrated circuit
12/22/16Secure authentication of users of devices using tactile and voice sequencing with feedback
12/22/16Capturing correlations between activity and non-activity attributes using n-grams
12/22/16Deleting information to maintain security level
12/22/16Processing visible coding sequence, playing visible coding sequence
12/22/16Locating objects using images from portable devices
12/22/16Background understanding in video data
12/22/16Artificial neuron apparatus
12/22/16Communicating postsynaptic neuron fires to neuromorphic cores
12/22/16Goal-oriented process generation
12/22/16Disambiguation in concept identification
12/22/16Incident prediction system
12/22/16Quality-directed adaptive analytic retraining
12/22/16Comparing utility and warranty of services
12/22/16Monitoring events in a project or organization
12/22/16Encrypted transit information for shipments
12/22/16Scheduling events based on messages produced by a message program
12/22/16Methods and systems to identify and manage recyclable materials
12/22/16Transaction fraud detection
12/22/16Content targeting with probabilistic presentation time determination
12/22/16Identifying word-senses based on linguistic variations
12/22/16Memory-aware matrix factorization
12/22/16Generating a tree map
12/22/16Geographic space management
12/22/16Alternative representations of virtual content in a virtual universe
12/22/16Management of moving objects
12/22/16Management of moving objects
12/22/16Providing question answering responses to how-to procedural questions
12/22/16Intelligent glasses for the visually impaired
12/22/16Fingerprint directed screen orientation
12/22/16Reconciliation of transcripts
12/22/16Displaying relevant information on wearable computing devices
12/22/16Hardening chromium oxide films in a magnetic tape head and other structures
12/22/16Time-varying filter for high-frequency reel disturbance rejection
12/22/16Editing media on a mobile device before transmission
12/22/16Latching current sensing amplifier for memory array
12/22/16Hardware-based compression ratio improvement
12/22/16Determining a cell state of a resistive memory cell
12/22/16Method and apparatus for faster deterimation of cell state of a resistive memory cell using a parallel resistor
12/22/16Dual liner silicide
12/22/16Siarc removal with plasma etch and fluorinated wet chemical solution combination
12/22/16Interposer with lattice construction and embedded conductive metal structures
12/22/16Backside contact to final substrate
12/22/16Method for forming a semiconductor structure containing high mobility semiconductor channel materials
12/22/16Dual liner silicide
12/22/16Method of source/drain height control in dual epi finfet formation
12/22/16Silicon germanium fin formation via condensation
12/22/16Time temperature monitoring system
12/22/16Backside device contact
12/22/16Conductive pillar shaped for solder confinement
12/22/16Fet trench dipole formation
12/22/16Integrated circuit having dual material cmos integration and method to fabricate same
12/22/16Method to form dual channel semiconductor material fins
12/22/16Fully-depleted silicon-on-insulator transistors
12/22/16Dual channel finfet with relaxed pfet region
12/22/16Monolithic visible-infrared focal plane array on silicon
12/22/16Method to form soi fins on a bulk substrate with suspended anchoring
12/22/16Forming multi-stack nanowires using a common release material
12/22/16Fully depleted silicon-on-insulator device formation
12/22/16Silicon germanium fin formation via condensation
12/22/16Method and apparatus providing improved thermal conductivity of strain relaxed buffer
12/22/16Recessing rmg metal gate stack for forming self-aligned contact
12/22/16Punch through stopper in bulk finfet device
12/22/16Fully depleted silicon-on-insulator device formation
12/22/16Low parasitic capacitance and resistance finfet device
12/22/16Contact-first field-effect transistors
12/22/16Thin film solar cell backside contact manufacturing process
12/22/16Thin film solar cell backside contact
12/22/16Perpendicular magnetic anisotropy bcc multilayers
12/22/16Reconfigurable voltage desensitization circuit to emulate system critical paths
12/22/16Reconfigurable voltage desensitization circuit to emulate system critical paths
12/22/16Fine delay structure with programmable delay ranges
12/22/16Fine delay structure with programmable delay ranges
12/22/16Increasing storage capacity and data transfer speed in genome data backup
12/22/16Chip authentication technology using carbon nanotubes
12/22/16Chip authentication technology using carbon nanotubes
12/22/16Dual-party session key derivation
12/22/16Ensuring regulatory compliance during application migration to cloud-based containers
12/22/16In-band ldap over ficon
12/22/16Dynamic middlebox redirection based on client characteristics
12/22/16Automated configuration of software defined network controller
12/22/16Web site reachability management for content browsing
12/22/16Managing data flows in software-defined network using network interface card
12/22/16Determining shortcut rules for bypassing waypoint network device(s)
12/22/16Managing a set of assets of a shared pool of configurable computing resources
12/22/16Selecting subsets of participants in electronic message threads
12/22/16Determining post velocity
12/22/16Regional firewall clustering in a networked computing environment
12/22/16Encrypted transit information for shipments
12/22/16User identity based on location patterns of non-associated devices
12/22/16Automatically altering and encrypting passwords in systems
12/22/16User identity based on location patterns of non-associated devices
12/22/16Dynamic extensible application server management
12/22/16Managing security breaches in a networked computing environment
12/22/16Capturing correlations between activity and non-activity attributes using n-grams
12/22/16Ip based real-time communications over a mobile network
12/22/16Geographic space management
12/22/16Displaying relevant information on wearable computing devices
12/22/16Monitoring system for tracking user activities for completing thoughts, ideas, or tasks of the user
12/22/16Automatically enforcing uniform resource locator workflow presentation
12/22/16Cognitive alert control framework for mobile devices
12/22/16Distributed cellular client tracking
12/22/16Management of moving objects
12/22/16Distributed cellular client tracking
12/22/16Management of moving objects
12/22/16Reconfiguring a mobile network based on cellular network state information
12/22/16Distributed cellular client network
12/22/16Distributed cellular client network
12/22/16Cooling system for electronics
12/15/16Vehicle control system
12/15/16Vehicle control system
12/15/16Pallet design for vibration mitigation
12/15/16Additives for orientation control of block copolymers
12/15/16Flame retardant pht compositions
12/15/16Tapering couplers for connecting fluid flow components
12/15/16Controlling devices based on physiological measurements
12/15/16Fuel vaporization using data center waste heat
12/15/16Fuel vaporization using data center waste heat
12/15/16Module testing utilizing wafer probe test equipment
12/15/16Symbol timing recovery scheme for parallel recording channel systems
12/15/16Mechanism for controlling subset of devices
12/15/16Scalable panel cooling system
12/15/16Identification of idle servers using power consumption
12/15/16Managing data center power consumption
12/15/16Touch interface with person recognition
12/15/16Touch interface with person recognition
12/15/16Dynamically transforming a tabular object based on actions within a graphical user interface
12/15/16Automation of user interface to facilitate computer-based instruction
12/15/16Region-based storage for volume data and metadata
12/15/16Selective memory dump using usertokens
12/15/16Self-adjusting backup operations
12/15/16Providing service address space for diagnostics collection
12/15/16Available frame queue processing
12/15/16Reducing new extent failures on target device during non-disruptive logical data set migration
12/15/16Temporary spill area for volume defragmentation
12/15/16Reserving a storage area and building page frame table entries
12/15/16Selective memory dump using usertokens
12/15/16System, apparatus, and method to facilitate management of agile software development projects
12/15/16Automatic generation of license terms for service application marketplaces
12/15/16Context-specific view of a hierarchical data structure
12/15/16Joining operator graph elements via whole program optimization
12/15/16Joining operator graph elements via whole program optimization
12/15/16Automatically complete a specific software task using hidden tags
12/15/16Context-specific view of a hierarchical data structure
12/15/16Automatic comment creation for computer files
12/15/16Load queue entry reuse for operand store compare history table update
12/15/16Migrating servers into a secured environment
12/15/16Optimizing provisioning through automated virtual machine template generation
12/15/16Import efficiency for whole-instance migration
12/15/16Managed services coordinator
12/15/16Managed services coordinator
12/15/16Relationship management of application elements
12/15/16Thread-based cache content saving for task switching
12/15/16Allocating a global resource in a distributed grid environment
12/15/16Generating problem signatures from snapshots of time series data
12/15/16Selective memory dump using usertokens
12/15/16Resolving and preventing computer system failures caused by changes to the installed software
12/15/16Event logging and error recovery
12/15/16Adaptive dispersed storage network (dsn) and system
12/15/16Synchronization policies among nodes
12/15/16Calculating bandwidth requirements for a specified recovery point objective
12/15/16Backup service with managed file transformation
12/15/16Rebuilding damaged areas of a volume table using a volume data set
12/15/16Reestablishing synchronization in a memory system
12/15/16Managing a set of tests based on other test failures
12/15/16Eliminate corrupted portions of cache during runtime
12/15/16Dynamic tracing framework for debugging in virtualized environments
12/15/16Enhanced bug resolution
12/15/16Enhanced bug resolution
12/15/16Dynamic test topology visualization
12/15/16Dynamic test topology visualization
12/15/16Sparsity-driven matrix representation to optimize operational and storage efficiency
12/15/16Garbage collection and other management of memory heaps
12/15/16Providing service address space for diagnostics collection
12/15/16Dynamic detection and software correction of incorrect lock and atomic update hint bits
12/15/16Sizing a write cache buffer based on emergency data save parameters
12/15/16Reserving a storage area and building page frame table entries
12/15/16Cache structure for a computer system providing support for secure objects
12/15/16Low latency data exchange between processing elements
12/15/16Access and protection of i2c interfaces
12/15/16Low latency data exchange between processing elements
12/15/16Organizing messages in a hierarchical chat room framework based on topics
12/15/16Optimization for rendering web pages
12/15/16Optimization for rendering web pages
12/15/16Visual indication for images in a question-answering system
12/15/16Open microphone perpetual conversation analysis
12/15/16Selective exposure of document tags for search, access, and feed based on user groups
12/15/16Demographic-based learning in a question answering system
12/15/16Mobile application discovery using an electronic map
12/15/16Aggregating modifications to a database for journal replay
12/15/16Storage data reduction analysis and forecast
12/15/16Tracking tuples to reduce redundancy in a graph
12/15/16Aggregating modifications to a database for journal replay
12/15/16Integrating external services with a clustered file system
12/15/16Maintaining a master schema
12/15/16Maintaining a master schema
12/15/16Identifying and displaying related content
12/15/16Database index for constructing large scale data level of details
12/15/16Partition-based index management in hadoop-like data stores
12/15/16Hierarchical diff files
12/15/16Verification of record based systems
12/15/16Automatic conflict resolution during software catalog import
12/15/16Predicting validity of data replication prior to actual replication in a transaction processing system
12/15/16Authorizing distributed task processing in a distributed storage network
12/15/16Verification of record based systems
12/15/16Modification of search subject in predictive search sentences
12/15/16Cognitive architecture with content provider managed corpus
12/15/16Tracking tuples to reduce redundancy in a graph
12/15/16Suppressing stream functionality to expedite preferred data
12/15/16Traversing a sparql query and translation to a semantic equivalent sql
12/15/16Data processing flow optimization
12/15/16Data processing flow optimization
12/15/16Ordering records for timed meta-data generation in a blocked record environment
12/15/16Database index for constructing large scale data level of details
12/15/16Functional space-time trajectory clustering
12/15/16Source code search engine
12/15/16Modification of search subject in predictive search sentences
12/15/16Declarative and adaptive content management
12/15/16Spatially-oriented traversal animations for network address transitions
12/15/16Synthetic events to chain queries against structured data
12/15/16Performance monitoring of wait times
12/15/16Automating system on a chip customized design integration, specification, and verification through a single, integrated service
12/15/16Variable accuracy parameter modeling in statistical timing
12/15/16Composite views for ip blocks in asic designs
12/15/16Addressing early mode slack fails by book decomposition
12/15/16Timing analysis of circuits using sub-circuit timing models
12/15/16Identifying usage of code
12/15/16User authentication
12/15/16Managing access to an electronic system
12/15/16Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history
12/15/16Input device for preventing password theft by thermal imaging
12/15/16Cloud data protector
12/15/16Utilization of multiple keypads for password inputs
12/15/16Visual comparisons using personal objects
12/15/16Attitude inference
12/15/16Modular array of vertically integrated superconducting qubit devices for scalable quantum computing
12/15/16Managing user transportation needs without user intervention
12/15/16Wired hierarchical inventory system
12/15/16Meeting scheduler for automated face-to-face meeting generation
12/15/16Conflict management for calendar events
12/15/16Conflict management for calendar events
12/15/16System and method for payment promise transfers based on preferences
12/15/16Attitude inference
12/15/16Personalized marketing by deriving the sentiments from telephonic and textual conversation over a mobile device
12/15/16Visual comparisons using personal objects
12/15/16Analysis of professional-client interactions
12/15/16Automated in store shopping system
12/15/16Automated in store shopping system
12/15/16Scoring transactional fraud using features of transaction payment relationship graphs
12/15/16Managing transportation deployment using customer activity
12/15/16Accuracy and efficiency of road user charging
12/15/16Accuracy and efficiency of road user charging
12/15/16Teaching aid using predicted patterns in spelling errors
12/15/16Providing targeted, evidence-based recommendations to improve content by combining static analysis and usage analysis
12/15/16Analysis of professional-client interactions
12/15/16Management of voice commands for devices in a cloud computing environment
12/15/16Symbol timing recovery scheme for parallel recording channel systems
12/15/16Current-mode sense amplifier
12/15/16Circuit to improve sram stability
12/15/16Tcam structures with reduced power supply noise
12/15/16Built-in self-test (bist) circuit and associated bist method for embedded memories
12/15/16Method of lateral oxidation of nfet and pfet high-k gate stacks
12/15/16Module testing utilizing wafer probe test equipment
12/15/16Chemoepitaxy etch trim using a self aligned hard mask for metal line to via
12/15/16Flip chip alignment mark exposing method enabling wafer level underfill
12/15/16Self-aligned low defect segmented iii-v finfet
12/15/16Semiconductor fins for finfet devices and sidewall image transfer (sit) processes for manufacturing the same
12/15/16Self-aligned hard mask for epitaxy protection
12/15/16Spacer chamfering gate stack scheme
12/15/16Vertically integrated memory cell
12/15/16Method and structure for enabling controlled spacer rie
12/15/16Tim strain mitigation in electronic modules
12/15/16Capacitors
12/15/16Capacitors
12/15/16Chip-on-chip structure and methods of manufacture
12/15/16Chip-on-chip structure and methods of manufacture
12/15/16Spacer chamfering gate stack scheme
12/15/16Alternative threshold voltage scheme via direct metal gate patterning for high performance cmos finfets
12/15/16Spacer chamfering gate stack scheme
12/15/16Series resistance reduction in vertically stacked silicon nanowire transistors
12/15/16Self-aligned channel-only semiconductor-on-insulator field effect transistor
12/15/16Self-aligned trench silicide process for preventing gate contact to silicide shorts
12/15/16Freestanding spacer having sub-lithographic lateral dimension and method of forming same
12/15/16Punch through stopper in bulk finfet device
12/15/16Spacer chamfering gate stack scheme
12/15/16Mis-il silicon solar cell with passivation layer to induce surface inversion
12/15/16Cable connector grouping apparatus
12/15/16High speed level translator
12/15/16Digital phase locked loop for low jitter applications
12/15/16Digital phase locked loop for low jitter applications
12/15/16Digital phase locked loop for low jitter applications
12/15/16Digital phase locked loop for low jitter applications
12/15/16Pad encoding and decoding
12/15/16Making subscriber data addressable as a device in a mobile data network
12/15/16Virtualization of consistency groups
12/15/16Performance monitoring of wait times
12/15/16Limiting data output from windowing operations
12/15/16Support for high availability of service appliances in a software-defined network (sdn) service chaining infrastructure
12/15/16Temperature sensitive routing of data in a computer system
12/15/16Locating service endpoints from a service registry
12/15/16Allocating a global resource in a distributed grid environment
12/15/16Framework for qos in embedded computer infrastructure
12/15/16Online communication modeling and analysis
12/15/16Electronic rumor cascade management in computer network communications
12/15/16Tracking conversation threads among electronic communications
12/15/16Tracking conversation threads among electronic communications
12/15/16Ensuring that a composed message is being sent to the appropriate recipient
12/15/16Eliciting positive responses to a social media posting
12/15/16Email thread sequence management
12/15/16Container-based system administration
12/15/16Configuration management for virtual machine environment
12/15/16Dynamic extensible application server management
12/15/16Suppressing stream functionality to expedite preferred data
12/15/16Transmission of hierarchical data files based on content selection
12/15/16Maintaining service configuration consistency across nodes of a clustered file system
12/15/16In-memory data store replication through remote memory sharing
12/15/16Clone efficiency in a hybrid storage cloud environment
12/15/16Allocating and managing cloud computing resources for disaster recovery
12/15/16Dynamic node group allocation
12/15/16Utilization of computing services
12/15/16Saving bandwidth in transmission of compressed data
12/15/16Request processing according to degradation monitoring
12/15/16Orchestrating resources in a multilayer computing environment by sending an orchestration message between layers
12/15/16Transferring information during a call
12/15/16Rapid serial visual presentation to deliver messages in social spaces
12/15/16Managing access to a conference call
12/15/16Selection and display of differentiating key frames for similar videos
12/15/16Adaptive sampling of smart meter data
12/15/16Direct data transfer among communication devices
12/15/16Navigation by using instant messaging
12/15/16Distributing subscriber data in a mobile data network
12/15/16Distributing subscriber data in a mobile data network
12/15/16Querying data from devices in an ad-hoc network
12/15/16Making subscriber data addressable as a device in a mobile data network
12/15/16Association of applications to clusters mapped to logical battery partitions
12/15/16Querying data from devices in an ad-hoc network
12/15/16Direct data transfer among communication devices
12/15/16Cooling system for electronic devices employing adjacent fan cages with interflow passages
12/15/16Cooling system for electronic devices employing adjacent fan cages with interflow passages
12/15/16Active control for two-phase cooling
12/08/16Safety harness monitoring and alerting system
12/08/16Manifold for a liquid cooling system
12/08/16Planar cavity mems and related structures, methods of manufacture and design structures
12/08/16Photoisomerizing polymers
12/08/16Photoisomerizing polymers
12/08/16Feedback control of dimensions in nanopore and nanofluidic devices
12/08/16Feedback control of dimensions in nanopore and nanofluidic devices
12/08/16Manifold for a liquid cooling system
12/08/16Map-matching by dual-level heuristic search
12/08/16Route stabilization scrolling mode
12/08/16Automated dynamic test case generation
12/08/16Mobile device proximity notification
12/08/16Virtual sensing for adjoint based incorporation of supplementary data sources in inversion
12/08/16Reduction of power consumption of a buffer in tape drive
12/08/16Initiating actions responsive to user expressions of a user while reading media content
12/08/16Performing a data write on a storage device
12/08/16Ensuring health and compliance of devices
12/08/16Autonomous dynamic optimization of platform resources
12/08/16Configuration of a physical control unit to support multiple logical control units for different tape drive types in a mainframe native tape attachment storage system
12/08/16Virtual grouping of memory
12/08/16Adjusting optimistic writes in a dispersed storage network
12/08/16Maintenance of a fabric priority during synchronous copy operations
12/08/16Secure sharing of storage area networks in a cloud
12/08/16Control of solid state memory device temperature using queue depth management
12/08/16Extending programmer workbenches for handling programming language differences
12/08/16Restricted instructions in transactional execution
12/08/16Vector floating point test data class immediate instruction
12/08/16Speculative load data in byte-write capable register file and history buffer for a multi-slice microprocessor
12/08/16Speculative load data in byte-write capable register file and history buffer for a multi-slice microprocessor
12/08/16Restricted instructions in transactional execution
12/08/16Generating customized on-demand videos from automated test scripts
12/08/16Locale-aware customization of public content
12/08/16Locale aware platform
12/08/16Hybrid simulation in a cloud computing environment
12/08/16Scalable policy management in an edge virtual bridging (evb) environment
12/08/16Virtual credential adapter for use with virtual machines
12/08/16Alerting hardware transactions that are about to run out of space
12/08/16Alerting hardware transactions that are about to run out of space
12/08/16Collecting memory operand access characteristics during transactional execution
12/08/16Experience-based dynamic sequencing of process options
12/08/16Eliminating execution of jobs-based operational costs of related reports
12/08/16Locale aware platform
12/08/16Methods, apparatus and computer programs for managing persistence
12/08/16Data processing
12/08/16Selective error coding
12/08/16Selective error coding
12/08/16Alternative multiple memory format storage in a storage network
12/08/16Using error correcting codes for parity purposes
12/08/16Adjusting dispersed storage network traffic due to rebuilding
12/08/16Temporary pipeline marking for processor error workarounds
12/08/16Multiple memory format storage in a storage network
12/08/16Dynamic cache row fail accumulation due to catastrophic failure
12/08/16Detecting merge conflicts and compilation errors in a collaborative integrated development environment
12/08/16Early risk identification in devops environments
12/08/16Automated dynamic test case generation
12/08/16Monitoring and capturing early diagnostic data
12/08/16Software defect reporting
12/08/16Prefetch threshold for cache restoration
12/08/16Store forwarding cache
12/08/16Set selection of a set-associative storage container
12/08/16Preemptive guest merging for virtualization hypervisors
12/08/16Storing a system-absolute address (saa) in a first level translation look-aside buffer (tlb)
12/08/16Key encryption and decryption
12/08/16Reformatting of context sensitive data
12/08/16Managing file changes made during a review process
12/08/16Data filtering based on a cell entry
12/08/16Contextual auto-correct dictionary
12/08/16Reformatting of context sensitive data
12/08/16Empathy injection for question-answering systems
12/08/16Schema discovery through statistical transduction
12/08/16Associating keywords from communication content with communication participants
12/08/16Distinguishing portions of output from multiple hosts
12/08/16Data table performance optimization
12/08/16Distinguishing portions of output from multiple hosts
12/08/16Media suggestions based on presence
12/08/16Multi-level colocation and processing of spatial data on mapreduce
12/08/16Filename-based inference of repository actions
12/08/16Repairing corrupted references
12/08/16Data table performance optimization
12/08/16Method and system for matching appropriate content with users by matching content tags and profiles
12/08/16Horizontal decision tree learning from very high rate data streams
12/08/16Webpage content search
12/08/16Scalable acceleration of database query operations
12/08/16Custom object-in-memory format in data grid network appliance
12/08/16Custom object-in-memory format in data grid network appliance
12/08/16Technology for generating a model in response to user selection of data
12/08/16System and method to identify, gather, and detect reusable digital assets
12/08/16Text processing method, system and computer program
12/08/16Utilizing word embeddings for term matching in question answering systems
12/08/16Enhanced answers in deepqa system according to user preferences
12/08/16Structured representation and classification of noisy and unstructured tickets in service delivery
12/08/16Techniques for promoting and viewing social content written by nearby people
12/08/16Colocation and anticolocation in colocation data centers via elastic nets
12/08/16Hybrid simulation in a cloud computing environment
12/08/16Chemo-epitaxy mask generation
12/08/16Protecting content displayed on a mobile device
12/08/16Verification of a pattern based passcode
12/08/16Automatically altering and encrypting passwords in systems
12/08/16Remediation of security vulnerabilities in computer software
12/08/16Electronic personal assistant privacy
12/08/16Intelligent key selection and generation
12/08/16Verifying motion data for accessing hardware elements
12/08/16Protecting content displayed on a mobile device
12/08/16Verifying motion data for accessing hardware elements
12/08/16Protecting content displayed on a mobile device
12/08/16Ensuring a desired distribution of images in a multimedia document utilizing facial signatures
12/08/16Hardware architecture for simulating a neural network of neurons
12/08/16Reconfigurable and customizable general-purpose circuits for neural networks
12/08/16Automated vehicular accident detection
12/08/16Identification and classification of web traffic inside encrypted network tunnels
12/08/16Implementing stochastic networks using magnetic tunnel junctions
12/08/16Utilizing word embeddings for term matching in question answering systems
12/08/16Horizontal decision tree learning from very high rate data streams
12/08/16Quantitative discovery of name changes
12/08/16Versioning of trained models used to deliver cognitive services
12/08/16Attribute-based nomenclature in supply chains
12/08/16Computer-implemented method, computer program product and system for analyzing a control-flow in a business process model
12/08/16Attribute-based nomenclature in supply chains
12/08/16System and method to identify, gather, and detect reusable digital assets
12/08/16Displaying calendar information in a horizontal bar
12/08/16Altering a functional characteristic of a computer used by an invitee to a meeting
12/08/16Cryptographic methods implementing proofs of work in systems of interconnected nodes
12/08/16Evaluation of document difficulty
12/08/16Force-directed graphs
12/08/16Force-directed graphs
12/08/16System and method for perspective preserving stitching and summarizing views
12/08/16Managing a smart appliance with a mobile device
12/08/16Dynamic learning supplementation with intelligent delivery of appropriate content
12/08/16Dynamic learning supplementation with intelligent delivery of appropriate content
12/08/16Rapid speech recognition adaptation using acoustic input
12/08/16Rapid speech recognition adaptation using acoustic input
12/08/16Determination of a common mode voltage
12/08/16Silicon germanium-on-insulator formation by thermal mixing
12/08/16Sige finfet with improved junction doping control
12/08/162-dimensional patterning employing tone inverted graphoepitaxy
12/08/16Reducing contact resistance in vias for copper interconnects
12/08/16Via formation using sidewall image tranfer process to define lateral dimension
12/08/16Thru-silicon-via structures
12/08/16Germanium dual-fin field effect transistor
12/08/16Minimizing shorting between finfet epitaxial regions
12/08/16Chip module with stiffening frame and orthogonal heat spreader
12/08/16Reducing contact resistance in vias for copper interconnects
12/08/16Registration mark formation during sidewall image transfer process
12/08/16Compound semiconductor devices having buried resistors formed in buffer layer
12/08/16Self-aligned source/drain contacts
12/08/16Deep trench sidewall etch stop
12/08/16Strain release in pfet regions
12/08/16Techniques for multiple gate workfunctions for a nanowire cmos technology
12/08/16Lateral bipolar transistor
12/08/16Semiconductor device including strained finfet
12/08/16Germanium dual-fin field effect transistor
12/08/16Silicon germanium-on-insulator formation by thermal mixing
12/08/16Reduced resistance short-channel ingaas planar mosfet
12/08/16Germanium dual-fin field effect transistor
12/08/16Formation of dislocation-free sige finfet using porous silicon
12/08/16Semiconductor device including strained finfet
12/08/16Heterogeneous source drain region and extension region
12/08/16Energy harvesting device with prefabricated thin film energy absorption sheets and roll-to-sheet and roll-to-roll fabrication thereof
12/08/16Energy harvesting device with prefabricated thin film energy absorption sheets and roll-to-sheet and roll-to-roll fabrication thereof
12/08/16Monolithic integration of heterojunction solar cells
12/08/16Controllable indium doping for high efficiency czts thin-film solar cells
12/08/16Hybrid cztsse photovoltaic device
12/08/16Mis-il silicon solar cell with passivation layer to induce surface inversion
12/08/16Controllable indium doping for high efficiency czts thin-film solar cells
12/08/16Low voltage transistor and logic devices with multiple, stacked piezoelectronic layers
12/08/16Pin attach converter
12/08/16Multi-bit error correction method and apparatus based on a bch code and memory system
12/08/16Deployment of enterprise applications
12/08/16Notifying original state listeners of events in a domain model
12/08/16Notifying original state listeners of events in a domain model
12/08/16Propagating a query in a network
12/08/16Quantifying and designing optimal connecting networks
12/08/16Quantifying and designing optimal connecting networks
12/08/16Multi-destination packet handling at overlay virtual network tunneling endpoints
12/08/16Message path selection within a network
12/08/16Allocating instantiated resources to an it-service
12/08/16Software defined infrastructures that encapsulate physical server resources into logical resource pools
12/08/16Selectively unmuting electronic messaging conversations
12/08/16Validating e-mails using message posting services
12/08/16Electronic personal assistant privacy
12/08/16Controlling a discovery component, within a virtual environment, that sends authenticated data to a discovery engine outside the virtual environment
12/08/16Utilization of multiple keypads for password inputs
12/08/16Unauthorized beacon detection
12/08/16Validating e-mails using message posting services
12/08/16Ingesting documents using multiple ingestion pipelines
12/08/16Application testing for security vulnerabilities
12/08/16Policy-based slice deletion in a dispersed storage network
12/08/16Enforcing runtime policies in a networked computing environment
12/08/16Techniques for promoting and viewing social content written by nearby people
12/08/16Collaborative based caching
12/08/16Web services documentation
12/08/16System, method and computer program product for virtual machine allocation
12/08/16Efficient maintenance of a distributed system membership view
12/08/16Storage mirroring over wide area network circuits with dynamic on-demand capacity
12/08/16Secure sharing of storage area networks in a cloud
12/08/16Web services documentation
12/08/16Locale-aware customization of public content
12/08/16Processing incoming messages
12/08/16Management of connections within a messaging environment based on the statistical analysis of server responsiveness
12/08/16Method for providing software as a service
12/08/16Identifying spatial locations of events within video image data
12/08/16Filtering
12/08/16Generating customized on-demand videos from automated test scripts
12/08/16Mobile device proximity notification
12/08/16Predicting lost devices using normal usage patterns
12/08/16Unauthorized beacon detection
12/08/16Multichannel preferred device notification
12/08/16Protection of device from electrostatic discharge (esd) damage
12/08/16Safety apparatus for electrical equipment rack
12/08/16Heat sink attachment on existing heat sinks
12/08/16Air-moving assemblies with flywheels
12/01/16Vehicle entertainment system
12/01/16Optimizing use states of a hybrid mobile vehicle along a discretized travel route
12/01/16Identifying a parking location with respect to a destination
12/01/16Cellular phone based optical detection of specific nucleic acid sequences
12/01/16High density nano-array for sensing
12/01/16High density nano-array for sensing
12/01/16Frequency-domain high-speed bus signal integrity compliance model
12/01/16Frequency-domain high-speed bus signal integrity compliance model
12/01/16Prediction verification using a self-calibrating camera
12/01/16Device for propagating light and method for fabricating a device
12/01/16Waveguide structure
12/01/16Optimizing cooling energy
12/01/16Optimizing cooling energy
12/01/16Generating summary of activity on computer gui
12/01/16Instantaneous preview of a data stream with non-linear time warping
12/01/16Dynamic tidy correlated icon depending on the favorite
12/01/16Dynamic tidy correlated icon depending on the favorite
12/01/16Storage device data overlay tracking and prevention
12/01/16Storage control block administration
12/01/16Cost-effective iaas (infrastructure-as-a-service) cloud storage based on adaptive virtual disks (avd)
12/01/16File index, metadata storage, and file system management for magnetic tape
12/01/16File index, metadata storage, and file system management for magnetic tape
12/01/16Maintaining versions of data in solid state memory
12/01/16Obtaining correct compile results by absorbing mismatches between data types representations
12/01/16Obtaining correct compile results by absorbing mismatches between data types representations
12/01/16Identifying cause of incidents in the devops environment automatically
12/01/16Configuration management of engineering artifacts with automatic identification of related change sets based on type system
12/01/16Configuration management of engineering artifacts with automatic identification of related change sets based on type system
12/01/16Thermal availability based instruction assignment for execution
12/01/16Enabling end of transaction detection using speculative look ahead
12/01/16Speculative branch handling for transaction abort
12/01/16Transaction abort instruction
12/01/16Transaction abort instruction
12/01/16Triggered controlled event listener learner
12/01/16Controlling the configuration of computer systems
12/01/16Logical data shuffling
12/01/16Updating networks with migration information for a virtual machine
12/01/16Synthesizing inputs to preserve functionality
12/01/16Efficient critical thread scheduling for non-privileged thread requests
12/01/16Efficient critical thread scheduling for non-privileged thread requests
12/01/16Salvaging lock elision transactions with instructions to change execution type
12/01/16First responder parities for storage array
12/01/16Increasing disaster resiliency by having a pod backed up to other peer pods in a site or beyond
12/01/16Frequency-domain high-speed bus signal integrity compliance model
12/01/16Performance enhancement mode selection tool
12/01/16Etl data flow design assistance through progressive context matching
12/01/16Identifying cause of incidents in the devops environment automatically
12/01/16Employing code overlays to facilitate software development
12/01/16Generation of test scenarios based on risk analysis
12/01/16Generating test scripts through application integration
12/01/16Detecting error states when interacting with web applications
12/01/16Analytics based control of thin provisioning environment
12/01/16In-memory caching with on-demand migration
12/01/16Document compression with neighborhood biased pixel labeling
12/01/16Structured document bounding language
12/01/16Smarter electronic reader
12/01/16Measuring transitions between visualizations
12/01/16Claim polarity identification
12/01/16Utilizing a dialectical model in a question answering system
12/01/16Information extraction in a natural language understanding system
12/01/16Storing and retrieving tags
12/01/16File path modification based management
12/01/16File path modification based management
12/01/16Individualized on-demand image information acquisition
12/01/16Enabling collaborative development of a database application across multiple database management systems
12/01/16In-place updates with concurrent reads in a decomposed state
12/01/16Tracking changes among similar documents
12/01/16Search results based on a search history
12/01/16Eigenvalue-based data query
12/01/16Database statistics based on transaction state
12/01/16Estimating the cost of data-mining services
12/01/16Estimating the cost of data-mining services
12/01/16Search results based on a search history
12/01/16Filter optimizer for data streams
12/01/16Mining relevant approximate subgraphs from multigraphs
12/01/16Post-migration validation of etl jobs and exception management
12/01/16Storing and retrieving tags
12/01/16Detecting overnegation in text
12/01/16User interface for a query answering system
12/01/16Detecting overnegation in text
12/01/16Context-dependent evidence detection
12/01/16Optimizing web crawling through web page pruning
12/01/16Publish-subscribe system with reduced data storage and transmission requirements
12/01/16Filter optimizer for data streams
12/01/16Locating previously communicated electronic messages
12/01/16System and method for data-driven web page navigation control
12/01/16Managing object identifiers
12/01/16Authoring system for assembling clinical knowledge
12/01/16Mining relevant approximate subgraphs from multigraphs
12/01/16High-speed latch circuits by selective use of large gate pitch
12/01/16Cfd modeling of a bounded domain with viscous region partitioning
12/01/16Bounded domain modeling with specified boundary conditions and mass balancing
12/01/16Cfd modeling of a bounded domain with viscous region partitioning
12/01/16Bounded domain modeling with specified boundary conditions and mass balancing
12/01/16Automating a microarchitecture design exploration environment
12/01/16Method and system for template pattern optimization for dsa patterning using graphoepitaxy
12/01/16Method and system for template pattern optimization for dsa patterning using graphoepitaxy
12/01/16Statistical tool for assessment of physicians
12/01/16Fraud detection based on assessment of physicians' activity
12/01/16System and method for optimizing allocation of medical units for patient treatment
12/01/16Recommending available medication based on symptoms
12/01/16Reducing delays associated with restoring quarantined files
12/01/16Security with respect to managing a shared pool of configurable computing resources
12/01/16Visual monitoring of queues using auxillary devices
12/01/16Scalable image distribution in virtualized server environments
12/01/16Neuron peripheral circuits for neuromorphic synaptic memory array based on neuron models
12/01/16Neuron peripheral circuits for neuromorphic synaptic memory array based on neuron models
12/01/16Intelligent service request classification and assignment
12/01/16Implementing workflow based on social network nodes
12/01/16Just in time learning driven by point of sale or other data and metrics
12/01/16Measuring change in software developer behavior under pressure
12/01/16Implementing workflow based on social network nodes
12/01/16Integrating dynamic interpersonal relationships in an organization hierarchy
12/01/16Just in time learning driven by point of sale or other data and metrics
12/01/16Product recommendations based on analysis of social experiences
12/01/16Cellular phone based optical detection of specific nucleic acid sequences
12/01/16Method to optimize the visualization of a map's projection based on data and tasks
12/01/16Tape head assembly for linear tape
12/01/16Embedded gallium-nitride in silicon
12/01/16Semiconductor nanowire fabrication
12/01/16Embedded gallium-nitride in silicon
12/01/16Silicon germanium-on-insulator formation by thermal mixing
12/01/16Aspect ratio for semiconductor on insulator
12/01/16Critical dimension shrink through selective metal growth on metal hardmask sidewalls
12/01/16Critical dimension shrink through selective metal growth on metal hardmask sidewalls
12/01/16Method of patterning dopant films in high-k dielectrics in a soft mask integration scheme
12/01/16Silicon-germanium fin formation
12/01/16Limiting electronic package warpage
12/01/16Substrate device and electric circuit arrangement
12/01/16Method for electrical coupling and electric coupling arrangement
12/01/16Preventing strained fin relaxation
12/01/16Aspect ratio for semiconductor on insulator
12/01/16Finfets with high quality source/drain structures
12/01/16Aspect ratio for semiconductor on insulator
12/01/16Thin film device with protective layer
12/01/16Methods of forming replacement fins for a finfet device using a targeted thickness for the patterned fin etch mask
12/01/16Protection of semiconductor-oxide-containing gate dielectric during replacement gate formation
12/01/16Semiconductor structure with an l-shaped bottom plate
12/01/16Highly responsive iii-v photodetectors using zno:al as n-type emitter
12/01/16Dry etch method for texturing silicon and device
12/01/16Dry etch method for texturing silicon and device
12/01/16Thin film device with protective layer
12/01/16Integration of area efficient antennas for phased array or wafer scale array antenna applications
12/01/16Voltage charge pump with segmented boost capacitors
12/01/16Dynamic high voltage driver with adjustable clamped output level
12/01/16Frequency-domain high-speed bus signal integrity compliance model
12/01/16Initializing a descrambler
12/01/16Sub-nanosecond distributed clock synchronization using alignment marker in ethernet ieee 1588 protocol
12/01/16Initializing a descrambler
12/01/16Initializing a descrambler
12/01/16Initializing a descrambler
12/01/16Automatic root key rollover during digital signature verification
12/01/16Secure cloud management agent
12/01/16Locating virtual machine(s) within virtual networks
12/01/16Computing resource license planning
12/01/16Secure cloud management agent
12/01/16Dynamic boundary based monitoring and metering
12/01/16Method and system for policy based lifecycle management of virtual software appliances
12/01/16Chatbots
12/01/16Status and time-based delivery services for instant messengers
12/01/16Prioritization of lock allocation
12/01/16Intelligent information sharing system
12/01/16Following/subscribing for productivity applications
12/01/16Leveraging an internet of things to initiate a physical object to perform a specific act that enhances an interaction of a user with the physical object
12/01/16Protecting sensitive information using an untrusted device
12/01/16Protecting sensitive information using a trusted device
12/01/16Dynamic permission roles for cloud based applications
12/01/16Probabilistically detecting low intensity threat events
12/01/16Security with respect to managing a shared pool of configurable computing resources
12/01/16Inferring security policies from semantic attributes
12/01/16Peer-to-peer networking through universal port connections
12/01/16Command process load balancing system
12/01/16Data replication across servers
12/01/16Conference call alerts
12/01/16Mobile application volatility management for situational applications
12/01/16Freeing up mobile network for important phone calls in case of disaster
12/01/16Mobility detection for edge applications in wireless communication networks
12/01/16Correlating road network information and user mobility information for wireless communication network planning
12/01/16Freeing up mobile network for important phone calls in case of disaster
11/24/16Antimicrobial guanidinium and thiouronium functionalized polymers
11/24/16Food steganography
11/24/16Coupling assemblies for connecting fluid-carrying components
11/24/16Vehicle convergence analysis based on sparse location data
11/24/16Chemical sensors based on plasmon resonance in graphene
11/24/16Chemical sensors based on plasmon resonance in graphene
11/24/16Chemical sensors based on plasmon resonance in graphene
11/24/16Simultaneously measuring degradation in multiple fets
11/24/16Circuit to detect previous use of computer chips using passive test wires
11/24/16Graphical user interface for rearranging icons
11/24/16Method, apparatus, and computer program for scrolling a document on a touch panel
11/24/16Page replacement algorithms for use with solid-state drives
11/24/16Determining adjustments of storage device timeout values based on synchronous or asynchronous remote copy state
11/24/16Low power storage array with metadata access
11/24/16Method for selectively performing a secure data erase to ensure timely erasure
11/24/16Adjustments of buffer credits for optimizing the number of retry operations and transfer ready operations
11/24/16Multiply-and-accumulate unit in carry-save adder format and application in a feedback loop equalizer
11/24/16Application bundle pulling
11/24/16Application bundle pulling
11/24/16Application bundle preloading
11/24/16Rolling upgrade of a distributed application
11/24/16Rolling upgrade of a distributed application
11/24/16Verification of backward compatibility of software components
11/24/16Conditional transaction end instruction
11/24/16Placement of virtual machines on physical hosts based on collocation rules
11/24/16Placement of virtual machines on physical hosts based on collocation rules
11/24/16Secure access to a virtual machine
11/24/16Virtualization of a central processing unit measurement facility
11/24/16Data processing
11/24/16Enhanced restart of a core dumping application
11/24/16Command line interpreter for accessing a data object stored in a distributed storage network
11/24/16Data encoding in solid-state storage apparatus
11/24/16Extended error correction coding data storage
11/24/16Extended error correction coding data storage
11/24/16Non-temporarily storing temporarily stored data in a dispersed storage network
11/24/16Storing data in accordance with a performance threshold
11/24/16Preferential allocation of processors for statesave in a storage controller
11/24/16Systems and methods for efficient data searching, storage and reduction
11/24/16Intelligent data protection system scheduling of open files
11/24/16Optimizing the number and type of database backups to achieve a given recovery time objective (rto)
11/24/16Generation of debugging log list in a blade server environment
11/24/16Error diagnostic in a production environment
11/24/16How to track operator behavior via metadata
11/24/16Performance testing of web components using identity information
11/24/16Data processing
11/24/16Data processing
11/24/16Demote instruction for relinquishing cache line ownership
11/24/16Providing indirect data addressing in an input/output processing system where the indirect data address list is non-contiguous
11/24/16Page replacement algorithms for use with solid-state drives
11/24/16Adjustment of buffer credits and other parameters in a startup phase of communications between a plurality of channels and a control unit
11/24/16Receiving buffer credits by a plurality of channels of one or more host computational devices for transmitting data to a control unit
11/24/16Overlay of input control to identify and restrain draft content from streaming
11/24/16Managing electronic message content
11/24/16Social network crowd translation
11/24/16Application bundle management across mixed file system types
11/24/16Grouping data in a database
11/24/16Removal of garbage data from a database
11/24/16Method and apparatus for identifying data inconsistency in a dispersed storage network
11/24/16Optimizing tables with too many columns in a database
11/24/16Using parallel insert sub-ranges to insert into a column store
11/24/16Detecting quasi-identifiers in datasets
11/24/16Detecting quasi-identifiers in datasets
11/24/16Managing an index of a table of a database
11/24/16Table organization using one or more queries
11/24/16Database query cursor management
11/24/16Optimizing tables with too many columns in a database
11/24/16Data management system with stored procedures
11/24/16Database query cursor management
11/24/16Data management system with stored procedures
11/24/16Managing staleness latency among application bundles
11/24/16Performance checking component for an etl job
11/24/16Automatic adjustment of data replication based on data access
11/24/16Cognitive reminder notification based on personal user profile and activity information
11/24/16Storing graph data in a relational database
11/24/16Storing graph data in a relational database
11/24/16Processing a stream of tuples
11/24/16Distribution of power vias in a multi-layer circuit board
11/24/16Distribution of power vias in a multi-layer circuit board
11/24/16Dynamic and accretive composition of patient engagement instruments for personalized plan generation
11/24/16Determining privacy leaks
11/24/16Text extraction from graphical user interface content
11/24/16Cognitive reminder notification mechanisms for answers to questions
11/24/16Cognitive reminder notification mechanisms for answers to questions
11/24/16Automatic time series exploration for business intelligence analytics
11/24/16Automatic time series exploration for business intelligence analytics
11/24/16Managing user ratings in a web services environment
11/24/16Automated traffic sensor placement planning
11/24/16Real-time object analysis with occlusion handling
11/24/16Text resizing within an embedded image
11/24/16Mobile device loss prevention using audio and spatial indicia
11/24/16Dynamic and accretive composition of patient engagement instruments for personalized plan generation
11/24/16Imbuing artificial intelligence systems with idiomatic traits
11/24/16Conversion of non-back-off language models for efficient speech decoding
11/24/16Complementary bipolar sram
11/24/16Edge trim processes and resultant structures
11/24/16Metallized junction finfet structures
11/24/16Contact structure and extension formation for iii-v nfet
11/24/16Directly forming sige fins on oxide
11/24/16Selective thickening of pfet dielectric
11/24/16Method for forming metal semiconductor alloys in contact holes and trenches
11/24/16Contact structure and extension formation for iii-v nfet
11/24/16Structure and method for beol nanoscale damascene sidewall-defined non-volatile memory element
11/24/16Structure and method for beol nanoscale damascene sidewall-defined non-volatile memory element
11/24/16Metallized junction finfet structures
11/24/16Semiconductor device with metal extrusion formation
11/24/16Semiconductor device with metal extrusion formation
11/24/16Interface passivation layers and methods of fabricating
11/24/16Embedded carbon-doped germanium as stressor for germanium nfet devices
11/24/16Iii-v mosfet with strained channel and semi-insulating bottom barrier
11/24/16Salicide formation on replacement metal gate finfet devices
11/24/16Silicon-containing, tunneling field-effect transistor including iii-n source
11/24/16Structure and process to tuck fin tips self-aligned to gates
11/24/16Photovoltaic devices with an interfacial band-gap modifying structure and methods for forming the same
11/24/16Sacrificial shorting straps for superconducting qubits
11/24/16Sacrificial shorting straps for superconducting qubits
11/24/16Magnetic domain wall shift register memory devices with high magnetoresistance ratio structures
11/24/16Transforming a phase-locked-loop generated chip clock signal to a local clock signal
11/24/16Adaptive error correction in a memory system
11/24/16Distributed storage network and method for storing and retrieving encryption keys
11/24/16Decision feedback equalizer
11/24/16Customizable serviceability mechanism
11/24/16Correlating computing network events
11/24/16How to track operator behavior via metadata
11/24/16Management of unreachable openflow rules
11/24/16Management of unreachable openflow rules
11/24/16Aliasing of named data objects and named graphs for named data networks
11/24/16Providing performance alternatives based on comparative price and performance data of a running saas instance
11/24/16Correction of incoming messaging
11/24/16Prioritizing messages in an activity stream with an actionable item or event for the user to respond
11/24/16Presenting an electronic message
11/24/16Multi-tenant aware dynamic host configuration protocol (dhcp) mechanism for cloud networking
11/24/16Taint mechanism for messaging system
11/24/16Distributed topology enabler for identity manager
11/24/16System, method and apparatus to visually configure an analysis of a program
11/24/16Rerouting data of a streaming application
11/24/16Rerouting data of a streaming application
11/24/16Managing staleness latency among application bundles
11/24/16Processing a stream of tuples
11/24/16Application bundle management across mixed file system types
11/24/16Managing redundancy among application bundles
11/24/16Message synchronization across multiple clients
11/24/16Application bundle preloading
11/24/16Overlay of input control to identify and restrain draft content from streaming
11/24/16Dynamic bundling of web components for asynchronous delivery
11/24/16Message synchronization across multiple clients
11/24/16Instantiating resources of an it-service
11/24/16Managing redundancy among application bundles
11/24/16Data communication with low-energy devices
11/24/16Data communication with low-energy devices
11/24/16Electronically binding to a lost mobile device
11/24/16Partitioning a coordination area in a wireless network
11/24/16Signal strength bookmarking for media content
11/24/16Signal strength bookmarking for media content
11/24/16Coupling assemblies for connecting fluid-carrying components
11/17/16Helmet having a cumulative concussion indicator
11/17/16Automatic adjustment of helmet parameters based on a category of play
11/17/16Detection of a traumatic brain injury with a mobile device
11/17/16Mouthguard for analysis of biomarkers for traumatic brain injury
11/17/16Suggesting adjustments to a helmet based on analysis of play
11/17/16Helmet having a cumulative concussion indicator
11/17/16Automatic adjustment of helmet parameters based on a category of play
11/17/16Detection of a traumatic brain injury with a mobile device
11/17/16Mouthguard for analysis of biomarkers for traumatic brain injury
11/17/16Helmet having an embedded cooling array
11/17/16Helmet having an embedded cooling array
11/17/16Three dimensional printing within polymeric currency
11/17/16Three dimensional printing within polymeric currency
11/17/16Efficient distribution and selection of storage media in a storage medium library
11/17/16Verifying a road network of a map
11/17/16Verifying a road network of a map
11/17/16Verifying a road network of a map
11/17/16Verifying a road network of a map
11/17/16Mapping preferred locations using multiple arrows
11/17/16Spectrometer insert for measuring temperature-dependent optical properties
11/17/16Semiconductor structure and method for manufacturing a semiconductor structure
11/17/16Automatically changing ergonomic conditions
11/17/16Cursor positioning on display screen
11/17/16Architecture and implementation of cortical system, and fabricating an architecture using 3d wafer scale integration
11/17/16Raid-topology-aware multipath routing
11/17/16Support of non-trivial scheduling policies along with topological properties
11/17/16Avoiding write conflicts in a dispersed storage network
11/17/16Reading device usability
11/17/16Specifying user defined or translator definitions to use to interpret mnemonics in a computer program
11/17/16Specifying user defined or translator definitions to use to interpret mnemonics in a computer program
11/17/16Method and apparatus for patching
11/17/16Optimizing branch re-wiring in a software instruction cache
11/17/16Apparatus and method for activating and shutting down enhanced pipeline stages and enhanced modules based on priority and performance requirements
11/17/16Mirroring application gui layout to operating system gui layout
11/17/16Performing server migration and dependent server discovery in parallel
11/17/16Support of non-trivial scheduling policies along with topological properties
11/17/16Deterministic real time business application processing in a service-oriented architecture
11/17/16Processor thread management
11/17/16Tasks_rcu detection of tickless user mode execution as a quiescent state
11/17/16Determining storage tiers for placement of data sets during execution of tasks in a workflow
11/17/16Tasks_rcu detection of tickless user mode execution as a quiescent state
11/17/16Preemptible-rcu cpu hotplugging while maintaining real-time response
11/17/16Command-based storage scenario prediction
11/17/16Personalizing error messages based on user behavior
11/17/16Recovery mechanisms across storage nodes that reduce the impact on host input and output operations
11/17/16Memory controller utilizing an error coding dispersal function
11/17/16Optimizing the number and type of database backups to achieve a given recovery time objective (rto)
11/17/16Recovering a volume table and data sets
11/17/16Application-centric analysis of leak suspect operations
11/17/16Preemptible-rcu cpu hotplugging while maintaining real-time response
11/17/16Locking a cache line for write operations on a bus
11/17/16Policy-based storage in a dispersed storage network
11/17/16Accelerator engine commands submission over an interconnect link
11/17/16Ensuring a desired distribution of images in a multimedia document utilizing facial signatures
11/17/16Dynamic modeling of geospatial words in social media
11/17/16Analytic driven markup for rapid handling of forms
11/17/16Mobile based lexicon and forecasting
11/17/16Dynamic modeling of geospatial words in social media
11/17/16Systems and methods for efficient data searching, storage and reduction
11/17/16Slice migration in a dispersed storage network
11/17/16Opportunistic wait-triggered elastic commit
11/17/16Intermediate data format for database population
11/17/16Representing search results via a three-dimensional matrix
11/17/16Determining entity relationship when entities contain other entities
11/17/16Managing a display of results of a keyword search on a web page by modifying attributes of a dom tree structure
11/17/16Ic layout pattern matching and classification system and method
11/17/16Monitoring impacts between individuals for concussion analysis
11/17/16Monitoring impacts between individuals for concussion analysis
11/17/16Static security analysis using a hybrid representation of string values
11/17/16Establishing and using a trust level in mobile phones
11/17/16Context-based security screening for accessing data
11/17/16Implementing a neural network algorithm on a neurosynaptic substrate based on criteria related to the neurosynaptic substrate
11/17/16Describing a paradigmatic member of a task directed community in a complex heterogeneous environment based on non-linear attributes
11/17/16Automatically changing ergonomic conditions
11/17/16Detection of mobile device pairing patterns using transactional proximity
11/17/16Sorting and displaying ecommerce product reviews
11/17/16Discriminating between normal and abnormal left ventricles in echocardiography
11/17/16Estimation of object properties in 3d world
11/17/16Suggesting adjustments to a helmet based on analysis of play
11/17/16Enhancing enterprise learning outcomes
11/17/16Visual voice search
11/17/16Deep tagging background noises
11/17/16Magnetic recording head having protected reader sensors and near zero recession writer poles
11/17/16Current-mode sense amplifier and reference current circuitry
11/17/16Method and structure for forming a dense array of single crystalline semiconductor nanocrystals
11/17/16Via formation using sidewall image transfer process to define lateral dimension
11/17/16Dual work function integration for stacked finfet
11/17/16Dual fin integration for electron and hole mobility enhancement
11/17/16Polysilicon resistor formation in silicon-on-insulator replacement metal gate finfet processes
11/17/16Polysilicon resistor formation in silicon-on-insulator replacement metal gate finfet processes
11/17/16Self aligned contact structure
11/17/16Package structures having integrated waveguides for high speed communications between package components
11/17/16Dual fin integration for electron and hole mobility enhancement
11/17/16Dual fin integration for electron and hole mobility enhancement
11/17/16Semiconductor structure containing low-resistance source and drain contacts
11/17/16Channel sige devices with multiple threshold voltages on hybrid oriented substrates, and methods of manufacturing same
11/17/16Bulk fin formation with vertical fin sidewall profile
11/17/16Polysilicon resistor formation in silicon-on-insulator replacement metal gate finfet processes
11/17/16High resistivity soft magnetic material for miniaturized power converter
11/17/16Reduction of defect induced leakage in iii-v semiconductor devices
11/17/16Reduction of defect induced leakage in iii-v semiconductor devices
11/17/16Self-aligned source and drain regions for semiconductor devices
11/17/16Dual work function integration for stacked finfet
11/17/16Self-aligned source and drain regions for semiconductor devices
11/17/16Local soi fins with multiple heights
11/17/16Armature-clad mram device
11/17/16Armature-clad mram device
11/17/16Package structures having integrated waveguides for high speed communications between package components
11/17/16Package structures having integrated waveguides for high speed communications between package components
11/17/16Electric ring with external power source
11/17/16Electric ring with external power source
11/17/16Compact transformer based reflector for even frequency multipliers
11/17/16Adaptive data compression
11/17/16Multiple erasure codes for distributed storage
11/17/16Managing beamformed signals to optimize transmission rates of sensor arrays
11/17/16Aliasing of named data objects and named graphs for named data networks
11/17/16Network resources management by a cloud consumer
11/17/16Appliance interconnection architecture
11/17/16Server virtualization
11/17/16Adaptive service chain management
11/17/16Offline, realtime, and historic monitoring of data packets
11/17/16Software defined network (sdn) switch clusters having layer-3 distributed router functionality
11/17/16Managing unavailability notices
11/17/16Instant message (im) routing to a virtual user consisting of a group of possible sub-users associated with a common im identity
11/17/16Generate and display contextual hints in a message
11/17/16Dynamic inclusion thresholds for social network conversations
11/17/16Real life to digital life event correlation
11/17/16Reply email clarification
11/17/16Automated migration planning for moving into a setting of multiple firewalls
11/17/16Establishing and maintaining an improved single sign-on (sso) facility
11/17/16Establishing and using a trust level in mobile phones
11/17/16Policy-based access in a dispersed storage network
11/17/16Access policy updates in a dispersed storage network
11/17/16Detecting web exploit kits by tree-based structural similarity search
11/17/16Detecting web exploit kits by tree-based structural similarity search
11/17/16Loading pegged page objects based on predefined preferences
11/17/16Data replication for a virtual networking system
11/17/16Dynamic proximity based networked storage
11/17/16Locating service endpoints from a service registry
11/17/16Method and system for information exchange utilizing an asynchronous persistent store protocol
11/17/16Resource recommendation, reuse and optimization through common context
11/17/16Performing server migration and dependent server discovery in parallel
11/17/16Marketing channel selection on an individual recipient basis
11/17/16System and method of locating wireless connection among a plurality of wireless connections
11/17/16Dry film solder mask composite laminate materials
11/17/16Solder void reduction between electronic packages and printed circuit boards
11/17/16Dry film solder mask composite laminate materials
11/10/16Ozone abatement system for semiconductor manufacturing system
11/10/16Ozone abatement system for semiconductor manufacturing system
11/10/16Graphene layers for identification of products
11/10/16Unmanned aerial vehicle for hazard detection
11/10/16Personalized elevator dispatch
11/10/16Planar cavity mems and related structures, methods of manufacture and design structures
11/10/16Planar cavity mems and related structures, methods of manufacture and design structures
11/10/16Planar cavity mems and related structures, methods of manufacture and design structures
11/10/16Condensation polymers for antimicrobial applications
11/10/16Functionally graded material by in-situ gradient alloy sputter deposition management
11/10/16Functionally graded material by in-situ gradient alloy sputter deposition management
11/10/16Computer-implemented method for recommending booths-to-visit
11/10/16Detecting device, detecting method, and program
11/10/16Moisture detection and ingression monitoring systems
11/10/16Biosample plate with data storage and wireless communications
11/10/16Debugging scan latch circuits using flip devices
11/10/16Continuous evanescent perturbation gratings in a silicon photonic device
11/10/16Unmanned vehicle movement path assignment and management
11/10/16Memory subsystem and computer system
11/10/16File-centric form selection
11/10/16Virtual cultural attache
11/10/16Text input on devices with touch screen displays
11/10/16Asynchronous tape backup and restore from tape backup in a disk storage environment
11/10/16Dynamic resource allocation for distributed cluster-storage network
11/10/16Providing access information to a storage controller to determine a storage tier for storing data
11/10/16Secure data migration in a dispersed storage network
11/10/16Monitoring of residual encrypted data to improve erase performance on a magnetic medium
11/10/16Migration between model elements of different types in a modeling environment
11/10/16Upgrading devices in a dispersed storage network
11/10/16Real-time device settings using knowledge base
11/10/16Virtual machine access control
11/10/16Optimization of virtual machines
11/10/16System and method to control heat dissipation through service level analysis
11/10/16Process grouping for improved cache and memory affinity
11/10/16System and method to control heat dissipation through service level analysis
11/10/16Dynamically managing workload placements in virtualized environments based on current user globalization customization requests
11/10/16Task grouping by context
11/10/16Storage and application intercommunication using acpi
11/10/16Operating a trace procedure for a computer program
11/10/16Memory device error history bit
11/10/16Error vector readout from a memory device
11/10/16Error vector readout from a memory device
11/10/16Memory device error history bit
11/10/16Encoding and writing of data on multitrack tape
11/10/16Storing a stream of data in a dispersed storage network
11/10/16Site-based namespace allocation
11/10/16Dispersed storage network (dsn) and system with improved security
11/10/16Utilizing data object storage tracking in a dispersed storage network
11/10/16Audit object generation in a dispersed storage network
11/10/16Resynchronizing to a first storage system after a failover to a second storage system mirroring the first storage system
11/10/16Operating a trace procedure for a computer program
11/10/16System and method to classify automated code inspection services defect output for defect analysis
11/10/16Risk-based test coverage and prioritization
11/10/16Managing memory in a computer system
11/10/16Managing memory in a computer system
11/10/16Private memory table for reduced memory coherence traffic
11/10/16Private memory table for reduced memory coherence traffic
11/10/16Distributed history buffer flush and restore handling in a parallel slice design
11/10/16Distributed history buffer flush and restore handling in a parallel slice design
11/10/16Memory subsystem and computer system
11/10/16Displaying at least one categorized message
11/10/16Displaying at least one categorized message
11/10/16Analyzing a click path in a spherical landscape viewport
11/10/16File-centric form selection
11/10/16Cross-domain adaptation using bloom filters
11/10/16Generating distributed word embeddings using structured information
11/10/16Generating distributed word embeddings using structured information
11/10/16Semi-supervised learning of word embeddings
11/10/16Date determination in natural language and disambiguation of structured data
11/10/16Generating multilingual queries
11/10/16Locating and ranking individuals using social media analytics
11/10/16Dynamic test case prioritization for relational database systems
11/10/16Date determination in natural language and disambiguation of structured data
11/10/16Retrieving data utilizing a distributed index
11/10/16Reducing decompression latency in a compression storage system
11/10/16Indexing a chameleon schema
11/10/16Dynamic test case prioritization for relational database systems
11/10/16Maintaining consistency between a transactional database system and a non-transactional content repository for document objects
11/10/16Maintaining consistency between a transactional database system and a non-transactional content repository for document objects
11/10/16Audit record transformation in a dispersed storage network
11/10/16Controlling mirroring of tables based on access prediction
11/10/16Windowing across operators in a streaming environment
11/10/16Supplementing a tuple with a derived value
11/10/16Idling individually specified objects during data replication
11/10/16Idling individually specified objects during data replication
11/10/16Windowing across operators in a streaming environment
11/10/16Generating multilingual queries
11/10/16Supplementing a tuple with a derived value
11/10/16Topology-based method to assess the environmental impact of deicing sodium chloride
11/10/16Immunity to inline charging damage in circuit designs
11/10/16Sharing and executing sensitive logic semantics
11/10/16Conducting a sequence of surveys using a challenge-response test
11/10/16Variable image presentation for authenticating a user
11/10/16Detecting malicious computer code in an executing program module
11/10/16Verification techniques for enhanced security
11/10/16Measuring display effectiveness with interactive asynchronous applications
11/10/16Visual summary of answers from natural language question answering systems
11/10/16Mining forums for solutions to questions
11/10/16Predicting effects of climate change on supply chain performance
11/10/16Advanced function usage-based billing
11/10/16Balancing inventory by personalized transition planning
11/10/16Tracking rendered offline advertisement
11/10/16Measuring display effectiveness with interactive asynchronous applications
11/10/16System and method for detecting inappropriate content in virtual worlds
11/10/16Smarter traffic signs
11/10/16Detecting the mood of a group
11/10/16Detecting the mood of a group
11/10/16Semi-supervised learning of word embeddings
11/10/16Differing magnetic read sensors on a magnetic head
11/10/16High density timing based servo format
11/10/16High resolution tape directory (hrtd) stored at end of data in an index partition
11/10/16Selective dopant junction for a group iii-v semiconductor device
11/10/16Non-lithographic line pattern formation
11/10/16Selective area heating for 3d chip stack
11/10/16Double layer release temporary bond and debond processes and systems
11/10/16Unidirectional spacer in trench silicide
11/10/16Selective thickening of pfet dielectric
11/10/16Phase changing on-chip thermal heat sink
11/10/16Interconnect structure
11/10/16Fixture to constrain laminate and method of assembly
11/10/16Immunity to inline charging damage in circuit designs
11/10/16Sub-fin doped bulk fin field effect transistor (finfet), integrated circuit (ic) and method of manufacture
11/10/16Dual material finfet on single substrate
11/10/16Fin cut for tight fin pitch by two different sit hard mask materials on fin
11/10/16Selective thickening of pfet dielectric
11/10/16Work function metal fill for replacement gate fin field effect transistor process
11/10/16Finfet with constrained source-drain epitaxial region
11/10/16Strained finfet source drain isolation
11/10/16Reduced reel motor disturbances in a tape drive system
11/10/16Reducing spontaneous emission in circuit quantum electrodynamics by a combined readout and filter technique
11/10/16Encoding and writing of data on multitrack tape
11/10/16Decoding data stored with three orthogonal codewords
11/10/16Iterative data secret-sharing transformation
11/10/16Apparatus and method for managing messages
11/10/16Automatic log sensor tuning
11/10/16Time and task based validation to enable or disable parental controls
11/10/16Dynamic middlebox redirection based on client characteristics
11/10/16Data streaming scheduler for dual chipset architectures that includes a high performance chipset and a low performance chipset
11/10/16Automatic transformation of messages between service versions
11/10/16Cloud based chat governance system based on behavioral patterns and situational-awareness
11/10/16Securing data in a dispersed storage network
11/10/16Network authentication of a geo-fenced volume
11/10/16Virtual machine access control
11/10/16Authenticating a request for an electronic transaction
11/10/16Verification techniques for enhanced security
11/10/16Container migration and provisioning
11/10/16Leveraging social networks in physical gatherings
11/10/16Tailoring content to be delivered to mobile device based upon features of mobile device
11/10/16Tailoring content to be delivered to mobile device based upon features of mobile device
11/10/16Query based volume determination
11/10/16Video sequence assembly
11/10/16Multichannel preferred device notification
11/10/16Enhanced mobile calling with call purpose
11/10/16Contact management and dialing using conditional flow logic
11/10/16Network authentication of a geo-fenced volume
11/10/16Multichannel preferred device notification
11/10/16Substrate containing low-dk-core glass fibers having low dielectric constant (dk) cores for use in printed circuit boards (pcbs), and method of making same
11/10/16Selective area heating for 3d chip stack
11/03/16Unified processing test structure
11/03/16Microcapsules adapted to rupture in a magnetic field to enable easy removal of one substrate from another for enhanced reworkability
11/03/16Controlling the operations of a robotic device
11/03/16Bondline control fixture and method of affixing first and second components
11/03/16Bondline control fixture and method of affixing first and second components
11/03/16Automatic vehicle climate control based on predicted air quality
11/03/16Vehicle and local area security system communications
11/03/16Vehicle and local area security system communications
11/03/16Automated selection of settings for an ironing device
11/03/16Device and method for converting heat into mechanical energy
11/03/16Automated, adaptive ventilation for a data center
11/03/16Heat exchange device
11/03/16On-chip usable life depletion meter and associated method
11/03/16Gold ion beam drilled nanopores modified with thiolated dna origamis
11/03/16Immunoassay for detection of virus-antibody nanocomplexes in solution by chip-based pillar array
11/03/16Residual material detection in backdrilled stubs
11/03/16Efficient method of retesting integrated circuits
11/03/16Method to harden photoresist for directed self-assembly processes
11/03/16Distribution model responsive to asset identification
11/03/16Video display for visually impaired people
11/03/16Changing a controlling device interface based on device orientation
11/03/16Control of icon movement on a graphical user interface
11/03/16User experience for multiple uploads of documents based on similar source material
11/03/16Changing a controlling device interface based on device orientation
11/03/16Detecting input based on multiple gestures
11/03/16Automatically managing the storage of a virtual machine
11/03/16Allocating storage extents in a storage system
11/03/16Low power storage array with metadata access
11/03/16Coordinated space reclamation in space-efficient flashcopy volumes
11/03/16Using spare capacity in solid state drives
11/03/16Low power storage array with metadata access
11/03/16Partial release management
11/03/16Smart load balancing replication when adding or removing storage disks in a distributed storage system
11/03/16Computer-implemented method, program, and tracer node for obtaining trace data relating to particular virtual machine
11/03/16Creating an audio file sample based upon user preferences
11/03/16Optimization of meta-template instantiations
11/03/16Release and management of composite applications on paas
11/03/16Apparatus and method for validating application deployment topology in cloud computing environment
11/03/16Populating a software catalogue with related product information
11/03/16Effective feature location in large legacy systems
11/03/16Placement of virtual machines on physical hosts
11/03/16Placement of virtual machines on physical hosts
11/03/16Anti-collocating multiple virtual entities using prioritized graph coloring and iterative placement
11/03/16Server consolidation using virtual machine resource tradeoffs
11/03/16Automated diagnosis of software crashes
11/03/16Database recovery and index rebuilds
11/03/16Database recovery and index rebuilds
11/03/16Determining an availability score based on available resources of different resource types in a cloud computing environment of storage servers providing cloud services to customers in the cloud computing environment to determine whether to perform a failure operation for one of the storage servers
11/03/16Debug management using a counter
11/03/16Real-time usage checking of dynamically generated program output
11/03/16Debug management using a counter
11/03/16Unified processing test structure
11/03/16Add-on memory coherence directory
11/03/16Suppressing virtual address translation utilizing bits and instruction tagging
11/03/16Deferred re-mru operations to reduce lock contention
11/03/16Mru batching to reduce lock contention
11/03/16Computation of destage tasks based on ranks with write operations
11/03/16Add-on memory coherence directory
11/03/16Page compression strategy for improved page out process
11/03/16Controlling data transfer for data processing
11/03/16Verifying content of resources in markup language documents by inclusion of a hash attribute-value pair in references to the content
11/03/16Managing changes to one or more files via linked mapping records
11/03/16Unsolicited bulk email detection using url tree hashes
11/03/16Unsolicited bulk email detection using url tree hashes
11/03/16Leveraging skipped relationships in a social network
11/03/16Scoring entries in a repository of business process models to facilitate searching
11/03/16Entity-driven logic for improved name-searching in mixed-entity lists
11/03/16Dynamic visualization of big data
11/03/16Automatic detection of claims with respect to a topic
11/03/16Management of event contexts using bookend events
11/03/16Management of event contexts using bookend contexts
11/03/16Identifying content in an incoming message on a social network
11/03/16Stratified sampling using adaptive parallel data processing
11/03/16Creation of structural diagram of web site based on both physical links and semantic links of web pages of web site
11/03/16Providing multi-lingual searching of mono-lingual content
11/03/16Stability score based re-ranking of search results
11/03/16Automatic measurement expression update
11/03/16Determining correlation coefficient(s) among different field effect transistor types and/or among different electrical parameter types
11/03/16Extracting clinical care pathways correlated with outcomes
11/03/16Generating predictive models based on text analysis of medical study data
11/03/16Generating predictive models based on text analysis of medical study data
11/03/16Authentication using optically sensed relative position
11/03/16Security policy generation based on snapshots of similar virtual machines
11/03/16Audience-based sensitive information handling for shared collaborative documents
11/03/16System and method for providing data security in a hosted service system
11/03/16Audience-based sensitive information handling for shared collaborative documents
11/03/16Warning a user about adverse behaviors of others within an environment based on a 3d captured image stream
11/03/16Consolidating multiple neurosynaptic core circuits into one reconfigurable memory block
11/03/16Event-based neural network with hierarchical addressing
11/03/16Producing clustered top-k plans
11/03/16High spatial resolution prediction
11/03/16Determining comprehensiveness of question paper given syllabus
11/03/16Scoring entries in a repository of business process models to facilitate searching
11/03/16Outcomes-based application monitoring
11/03/16Predicting outcomes from measures of group cooperation with applications in traffic alert and control
11/03/16Predicting outcomes from measures of group cooperation with applications in traffic alert and control
11/03/16Decision support tool for business rules management in a booking system
11/03/16Decision support tool for business rules management in a booking system
11/03/16Customer load of field programmable gate arrays
11/03/16Detecting fraudulent mobile payments
11/03/16Secure identity authentication in an electronic transaction
11/03/16Device and membership identity matching
11/03/16Data interpolation using matrix completion
11/03/16High spatial resolution prediction
11/03/16Interpolation using matrix completion
11/03/16Predicting individual customer returns in e-commerce
11/03/16Predicting individual customer returns in e-commerce
11/03/16Product offering analytics
11/03/16Interactive content- based information distribution to a select audience group
11/03/16Interactive content- based information distribution to a select audience group
11/03/16Method for market risk assessment for healthcare applications
11/03/16Environmental-based location monitoring
11/03/16Utilizing test-suite minimization for examination creation
11/03/16Selective monitor control
11/03/16Magnetic tunnel junction switching assisted by temperature-gradient induced spin torque
11/03/16Gold ion beam drilled nanopores modified with thiolated dna origamis
11/03/16Low defect relaxed sige/strained si structures on implant anneal buffer/strain relaxed buffer layers with epitaxial rare earth oxide interlayers and methods to fabricate same
11/03/16Low defect relaxed sige/strained si structures on implant anneal buffer/strain relaxed buffer layers with epitaxial rare earth oxide interlayers and methods to fabricate same
11/03/16Preparation of low defect density of iii-v on si for device fabrication
11/03/16Preparation of low defect density of iii-v on si for device fabrication
11/03/16Techniques for fabricating reduced-line-edge-roughness trenches for aspect ratio trapping
11/03/16Structure and method to form iii-v, ge and sige fins on insulator
11/03/16Performance optimized gate structures
11/03/16Graphoepitaxy directed self-assembly process for semiconductor fin formation
11/03/16Fin field effect transistor including a strained epitaxial semiconductor shell
11/03/16Light sensitive switch for semiconductor package tamper detection
11/03/16Light sensitive switch for semiconductor package tamper detection
11/03/16Method of forming a solder bump on a substrate
11/03/16Semiconductor device including built-in crack-arresting film structure
11/03/16Structure having group iii-v, ge and sige fins on insulator
11/03/16Method and structure for preventing epi merging in embedded dynamic random access memory
11/03/16Photodetector and methods of manufacture
11/03/16Annealed metal source drain under gate
11/03/16Application of super lattice films on insulator to lateral bipolar transistors
11/03/16Fin field effect transistor including a strained epitaxial semiconductor shell
11/03/16Silicon germanium alloy fins with reduced defects
11/03/16Optimized grid design for concentrator solar cell
11/03/16Surface treatment for photovoltaic device
11/03/16Integrated photodetector waveguide structure with alignment tolerance
11/03/16Light sensitive switch for semiconductor package tamper detection
11/03/16Superconducting airbridge crossover using superconducting sacrificial material
11/03/16Cable connector grouping apparatus
11/03/16Monolithic integrated photonics with lateral bipolar and bicmos
11/03/16Electrostatic discharge protection device with power management
11/03/16Electrostatic discharge protection device with power management
11/03/16Photovoltaic thermal hybrid systems and method of operation thereof
11/03/16Voltage-controlled ring oscillator with delay line
11/03/16Differential key backup
11/03/16Secure optical codes for accessing content
11/03/16Accessing content by processing secure optical codes
11/03/16Virtual gateways and implicit routing in distributed overlay virtual environments
11/03/16Yield tolerance in a neurosynaptic system
11/03/16Tuning ldap server and directory database
11/03/16Automatic measurement expression update
11/03/16Declarative service domain federation
11/03/16Outcomes-based application monitoring
11/03/16Automated split of work in a cloud environment
11/03/16Synchronizing out-of-sync elements in a distributed fibre channel forwarder
11/03/16Condition-based online communication collaboration
11/03/16Email cost analytics
11/03/16Determining a visibility of an online conversation for a new participant
11/03/16Automatic and predictive management of electronic messages
11/03/16System conversion in a networked computing environment
11/03/16Data protection in a networked computing environment
11/03/16System and method to provide server control for access to mobile client data
11/03/16Forming a group of users for a conversation
11/03/16Release and management of composite applications on paas
11/03/16Automated split of work in a cloud environment
11/03/16Condition-based online communication collaboration
11/03/16Managing data access on a computing device
11/03/16Dynamic visualization of big data
11/03/16Forming a group of users for a conversation
11/03/16Video composition by dynamic linking
11/03/16System and method for cognitive filtering of audio in noisy environments
11/03/16Multi-channel speaker output orientation detection
11/03/16Peer-to-peer sharing of network resources
11/03/16Propagation velocity tuning with functionalized carbon nanomaterial in printed wiring boards (pwbs) and other substrates, and design structures for same
11/03/16Lid and power supply interlock mechanism
11/03/16Automated, adaptive ventilation for a data center
10/27/16Encapsulated payloads bonded to polymeric materials
10/27/16Artificial electronic skin
10/27/16Acoustic stimulation for the prevention and treatment of obesity
10/27/16Acoustic stimulation for the prevention and treatment of obesity
10/27/16Localized computer system humidity control
10/27/16Encapsulated payloads bonded to polymeric materials
10/27/16Verifying a road network of a map
10/27/16Identifying a parking location with respect to a destination
10/27/16Remote sensing using pulse-width modulation
10/27/16Remote sensing using pulse-width modulation
10/27/16Field effect based nanopore device
10/27/16Pre-test power-optimized bin reassignment following selective voltage binning
10/27/16Enhanced emergency reporting system
10/27/16Synchronization of iterative methods for solving optimization problems with concurrent methods for forecasting in stream computing
10/27/16Localized computer system humidity control
10/27/16Branch prediction with power usage prediction and control
10/27/16Sub-block input/output (i/o) commands for storage device including byte stream buffer
10/27/16Tracking ownership of memory in a data processing system through use of a memory monitor
10/27/16Method for backing up data on tape
10/27/16Data migration using multi-storage volume swap
10/27/16On-chip traffic prioritization in memory
10/27/16Techniques for facilitating cracking and fusion within a same instruction group
10/27/16Techniques for facilitating cracking and fusion within a same instruction group
10/27/16Instruction predication using unused datapath facilities
10/27/16Machine learning for virtual machine migration plan generation
10/27/16Virtual machine (vm)-to-vm flow control for overlay networks
10/27/16Preventing interoperability conflicts in a shared computing environment
10/27/16Machine learning for virtual machine migration plan generation
10/27/16Software warmup efficiency
10/27/16Job scheduling management
10/27/16Enhanced command selection in a networked computing environment
10/27/16Dynamic load balancing for data allocation to servers
10/27/16Identifying solutions to application execution problems in distributed computing environments
10/27/16Managing a computing system crash
10/27/16Managing a computing system crash
10/27/16Dispersed multi-media content for a centralized digital video storage system
10/27/16Detecting uninitialized memory references
10/27/16Detecting causes of performance regression to adjust data systems
10/27/16Resource-constrained test automation
10/27/16Probabilistic associative cache
10/27/16Security for memory module data
10/27/16Programmatic self-learning of inter-system document processing configurations
10/27/16Manual creation for a program product
10/27/16Automated correction of natural language processing systems
10/27/16Collating and intelligently sequencing installation documentation
10/27/16Testing and training a question-answering system
10/27/16Generating a context for translating strings based on associated application source code and markup
10/27/16Identifying unvisited portions of visited information
10/27/16Preserving high value entries in an event log
10/27/16Data fragmentation tuning and candidacy persistence
10/27/16Managing data records
10/27/16Compression-based filtering for deduplication
10/27/16Database storage reclaiming program
10/27/16Crowd sourced data sampling at the crowd
10/27/16Database storage reclaiming program
10/27/16Deleted database record reuse
10/27/16Augmenting the display of data in a tree format
10/27/16Index-only multi-index access
10/27/16Deleted database record reuse
10/27/16System and method of integrating time-aware data from multiple sources
10/27/16Merging metadata for database storage regions based on overlapping range values
10/27/16Index-only multi-index access
10/27/16Distributed balanced optimization for an extract, transform, and load (etl) job
10/27/16Distributed balanced optimization for an extract, transform, and load (etl) job
10/27/16Method and apparatus for processing database data in distributed database system
10/27/16Crowd sourced data sampling at the crowd
10/27/16Olap engine workload distribution using cost based algorithms
10/27/16Custodian disambiguation and data matching
10/27/16Custodian disambiguation and data matching
10/27/16Estimating probability of spreading information by users on micro-weblogs
10/27/16Providing searching strategy in connection with answering question in message
10/27/16Content contribution validation
10/27/16Social content features based on user tracking
10/27/16Augmenting the display of data in a tree format
10/27/16Systems and methods for controlling integrated circuit chip temperature using timing closure-based adaptive frequency scaling
10/27/16Method of hierarchical timing closure employing dynamic load-sensitive feedback constraints
10/27/16Determining a computer's position and system for manufacturing a tag
10/27/16Far view two-dimensional symbology
10/27/16Far view two-dimensional symbology
10/27/16Clarification of submitted questions in a question and answer system
10/27/16Attitude detection
10/27/16Attitude detection
10/27/16Decision processing and information sharing in distributed computing environment
10/27/16Latent trait analysis for risk management
10/27/16Management of an object
10/27/16Synchronization of iterative methods for solving optimization problems with concurrent methods for forecasting in stream computing
10/27/16Collection of information using contactless devices in combination with mobile computing devices
10/27/16Multilayer dielectric structures with graded composition for nano-scale semiconductor devices
10/27/16Finfet having controlled dielectric region height
10/27/16Stratified gate dielectric stack for gate dielectric leakage reduction
10/27/16Method and structure of forming finfet electrical fuse structure
10/27/16Preventing unauthorized use of integrated circuits for radiation-hard applications
10/27/16Electrostatic discharge devices and methods of manufacture
10/27/16Self aligned structure and method for high-k metal gate work function tuning
10/27/16Hybrid high electron mobility transistor and active matrix structure
10/27/16High density capacitor structure and method
10/27/16Minimizing shorting between finfet epitaxial regions
10/27/16Design structure for finfet fins
10/27/16Method and structure for forming dielectric isolated finfet with improved source/drain epitaxy
10/27/16Forming a fin using double trench epitaxy
10/27/16Stratified gate dielectric stack for gate dielectric leakage reduction
10/27/16Forming a fin using double trench epitaxy
10/27/16Method and structure of forming finfet electrical fuse structure
10/27/16Method and structure for multigate finfet device epi-extension junction control by hydrogen treatment
10/27/16Tunable voltage margin access diodes
10/27/16Managing data records
10/27/16Enabling real-time operational environment conformity within an enterprise architecture model dashboard
10/27/16Software defined infrastructures that encapsulate physical server resources into logical resource pools
10/27/16Software defined infrastructures that encapsulate physical server resources into logical resource pools
10/27/16Tracking content sharing across a variety of communications channels
10/27/16Dynamically adjusting quality of service using cognitive focus of attention detection
10/27/16System detection and flow control
10/27/16Dynamic load balancing for data allocation to servers
10/27/16Preventing interoperability conflicts in a shared computing environment
10/27/16Sharing of information extracted from messages in collaborative systems
10/27/16Modifying environmental chat distance based on chat density in an area of a virtual world
10/27/16Social content features based on user tracking
10/27/16System and method for enhanced challenge-response authentication
10/27/16Dynamic enterprise security control based on user risk factors
10/27/16Monitoring device monitoring network
10/27/16Solution-centric reporting of security warnings
10/27/16Reporting security vulnerability warnings
10/27/16Embedding global barrier and collective in a torus network
10/27/16Granular instant import of replicated vtl cartridge into a backup catalog
10/27/16Tracking content sharing across a variety of communications channels
10/27/16Managing data acquisition
10/27/16Managing data acquisition
10/27/16Testing computerized analysis of communication data
10/27/16Managing crowd sourced data acquisition
10/27/16Managing crowd sourced data acquisition
10/27/16Authentication of user computers
10/27/16Mobility management of osi connections between cell towers
10/27/16Controlling a delivery of voice communications over a cellular data network or a wireless network based on user's profile
10/27/16Hybrid high electron mobility transistor and active matrix structure
10/20/16Touch input device with pathogen transmission mitigation
10/20/16Touch input device with pathogen transmission mitigation
10/20/16Drone-based microbial analysis system
10/20/16High-performance, filler-reinforced, recyclable composite materials
10/20/16Additives for orientation control of block copolymers
10/20/16Weather-driven multi-category infrastructure impact forecasting
10/20/16Autonomous drone service system
10/20/16Software-centric power management
10/20/16Finger-line based remote control
10/20/16Touch prediction for visual displays
10/20/16Touch prediction for visual displays
10/20/16Touch input device with pathogen transmission mitigation
10/20/16Drag and drop quoting mechanism for use with discussion forums
10/20/16Touch prediction for visual displays
10/20/16Touch prediction for visual displays
10/20/16Standardized visual indicators in electronic media
10/20/16Duplication of objects with positioning based on object distance
10/20/16Physical address management in solid state memory
10/20/16Capacity forecasting based on capacity policies and transactions
10/20/16Capacity forecasting based on capacity policies and transactions
10/20/16Data allocation among devices with different data rates
10/20/16Coordinated point-in-time snapshots of multiple computing platforms
10/20/16Determining errors and warnings corresponding to a source code revision
10/20/16Visualizing a congruency of versions of an application across phases of a release pipeline
10/20/16Determining errors and warnings corresponding to a source code revision
10/20/16Visualizing a congruency of versions of an application across phases of a release pipeline
10/20/16Modeling memory use of applications
10/20/16Profiling multiple virtual machines in a distributed system
10/20/16Resource management and allocation using history information stored in application's commit signature log
10/20/16Method and system for dynamic pool reallocation
10/20/16Multi-dimension scheduling among multiple consumers
10/20/16Method and system for allocating fpga resources
10/20/16Managing resources based on an application's historic information
10/20/16Dynamically choosing data to collect in a system
10/20/16Dynamically choosing data to collect in a system
10/20/16Multi-dimension scheduling among multiple consumers
10/20/16Live partition mobility with shared persistent reservations
10/20/16Managing hydrocarbon energy production while proactively maintaining a balanced workload
10/20/16Automated transfer of user data between applications utilizing different interaction modes
10/20/16Automated transfer of user data between applications utilizing different interaction modes
10/20/16Wirelessly communicating a data file
10/20/16Encrypting data for storage in a dispersed storage network
10/20/16Checkpoint triggering in a computer system
10/20/16Randomized testing within transactional execution
10/20/16Creation of highly available pseudo-clone standby servers for rapid failover provisioning
10/20/16Debug management using dynamic analysis based on state information
10/20/16Debug management using dynamic analysis based on state information
10/20/16Modeling memory use of applications
10/20/16Automatic repair of scripts
10/20/16Call stack display with program flow indication
10/20/16Call stack display with program flow indication
10/20/16Customized application performance testing of upgraded software
10/20/16Translation verification testing
10/20/16Synchronizing updates of page table status indicators and performing bulk operations
10/20/16Smarter electronic reader
10/20/16Non-disruptive method for page rendering in a portal when a performance constraint is not fulfilled
10/20/16Non-disruptive method for page rendering in a portal when a performance constraint is not fulfilled
10/20/16Determining user-friendly information to solicit in a question and answer system
10/20/16Smarter electronic reader
10/20/16Archive migration system
10/20/16Atomic incremental load for map-reduce systems on append-only file systems
10/20/16Resource allocation for migration within a multi-tiered system
10/20/16Synchronizing data rules and corresponding metadata to implement data governance
10/20/16Removing sets of tuples in a streaming environment
10/20/16Conforming data structure instances to schema versions
10/20/16Index masking based on insert contention ratio
10/20/16Index masking based on insert contention ratio
10/20/16Removing sets of tuples in a streaming environment
10/20/16Visual representation of question quality
10/20/16Optimizing relational database queries with multi-table predicate expressions
10/20/16Systems and methods for finding optimal query plans
10/20/16Answering natural language table queries through semantic table representation
10/20/16Intermediate window results in a streaming environment
10/20/16Intermediate window results in a streaming environment
10/20/16Using access count of the remote site to optimize file transfer order for asynchronous replication
10/20/16Predicting a command in a command line interface
10/20/16Identifying influencers for topics in social media
10/20/16Multi objective design selection
10/20/16Automatic calibration of a model for a complex flow system
10/20/16Genome compression and decompression
10/20/16Numeric keypad encryption for augmented reality devices
10/20/16Managing software deployment
10/20/16Managing keys used for encrypting data
10/20/16Multi-focused fine-grained security framework
10/20/16Numeric keypad encryption for augmented reality devices
10/20/16Annealed dropout training of neural networks
10/20/16Annealed dropout training of neural networks
10/20/16System and method for optimizing teams
10/20/16Visualization of runtime resource policy attachments and applied policy details
10/20/16Spatio-temporal crew planning
10/20/16Task prioritization and optimization using interconnected data sources
10/20/16Gui support for diagnosing and remediating problems that threaten on-time delivery of software and systems
10/20/16Scheduling crop transplantations
10/20/16Weather-driven multi-category infrastructure impact forecasting
10/20/16Scheduling and simulation system
10/20/16Managing potential meeting conflicts
10/20/16Person is a resource for a calendar invite
10/20/16Person is a resource for a calendar invite
10/20/16Managing potential meeting conflicts
10/20/16Mobile interactive comparison chart
10/20/16Synchronizing an augmented reality video stream with a displayed video stream
10/20/16Autonomous drone service system
10/20/16Coherent pitch and intensity modification of speech signals
10/20/16Fold over emitter and collector field emission transistor
10/20/16Self-forming metal barriers
10/20/16Semiconductor structure with integrated passive structures
10/20/16Whole wafer edge seal
10/20/16Flip-chip electronic device with carrier having heat dissipation elements free of solder mask
10/20/16Semiconductor structure with an l-shaped bottom plate
10/20/16Semiconductor structure with integrated passive structures
10/20/16Replacement metal gate dielectric cap
10/20/16On chip antenna with opening
10/20/16Mechanical resonator with a spring-mass system comprising a phase-change material
10/20/16Mechanical resonator with a spring-mass system comprising a phase-change material
10/20/16Digital certificate issuer-correlated digital signature verification
10/20/16Digital certificate issuer-correlated digital signature verification
10/20/16Computer network system and a method for monitoring and controlling a network
10/20/16Replicating configuration between multiple geographically distributed servers using the rest layer, requiring minimal changes to existing service architecture
10/20/16Policy-based resource management with target-driven remediation on server
10/20/16Discovery of a set of nodes in a network
10/20/16Determining a risk level for server health check processing
10/20/16Identifying end users in need of technical assistance
10/20/16Data packet retransmission processing
10/20/16Data packet retransmission processing
10/20/16Storage area network workload balancing
10/20/16Method and system for policy based lifecycle management of virtual software appliances
10/20/16Archive migration system
10/20/16Pre-staging messages at a remote location
10/20/16Email service adapter
10/20/16Coordinated deep tagging of media content with community chat postings
10/20/16Predicting viewing activity of a posting to an activity stream
10/20/16Reducing a negative social interaction
10/20/16Interactive splitting of entries in social collaboration environments
10/20/16Preventing network attacks on baseboard management controllers
10/20/16Collaborative sign-on
10/20/16Preventing network attacks on baseboard management controllers
10/20/16Generating accurate preemptive security device policy tuning recommendations
10/20/16Multi-focused fine-grained security framework
10/20/16Managing access in one or more computing systems
10/20/16Conferencing based on portable multifunction devices
10/20/16Addressing application program interface format modifications to ensure client compatibility
10/20/16Systems and methods for cloud-based agricultural data processing and management
10/20/16Location accurate mobile events and social content
10/20/16Facilitating context delivery during communication sessions
10/20/16Transmitting and receiving data based on multipath
10/20/16Home base station system and data access processing method thereof
10/20/16Screw attachment system for electronic assemblies
10/20/16Electromagnetic gaskets for a cable connection
10/13/16Increasing solder hole-fill in a printed circuit board assembly
10/13/16Polyhexahydrotriazine dielectrics
10/13/16Verifying a road network of a map
10/13/16Optical capture and isolation of circulating tumor cells in a micro-fluidic device utilizing size selective trapping with optical cogwheel tweezers
10/13/16Optical capture and isolation of circulating tumor cells in a micro-fluidic device utilizing size selective trapping with optical cogwheel tweezers
10/13/16Rotating magnetic field hall measurement system
10/13/16Rotating magnetic field hall measurement system
10/13/16Retrieving focus-based information
10/13/16Management of a touchscreen interface of a device
10/13/16Establishing a communication link between plural participants based on preferences
10/13/16Grouping of tracks for copy source to target destage on global mirror secondary
10/13/16Higher and lower availability prioritization of storage cells in an automated library
10/13/16Optimizing volume placement based upon desired response time and priority
10/13/16Substitution of a target volume of a secondary storage controller for a source volume of a primary storage controller for executing a write operation
10/13/16Adaptive concurrency control using hardware transactional memory and locking mechanism
10/13/16Method of writing a file to a plurality of media and a storage system thereof
10/13/16Annotating a generator output stream
10/13/16System and method for pipeline management of artifacts
10/13/16Preferential cpu utilization for tasks
10/13/16Datacenter scheduling of applications using machine learning techniques
10/13/16Prioritising event processing based on system workload
10/13/16Resource allocation/de-allocation and activation/deactivation
10/13/16Adaptive concurrency control using hardware transactional memory and locking mechanism
10/13/16Tape volume overwrite protection during error recovery
10/13/16Error source identification on time-of-day network
10/13/16Apparatus, system and method for data collection, import and modeling
10/13/16Enhanced dump data collection from hardware fail modes
10/13/16Error source identification on time-of-day network
10/13/16Processing main cause errors and sympathetic errors in devices in a system
10/13/16Apparatus, system and method for data collection, import and modeling
10/13/16Multi-threaded debugger support
10/13/16Software test automation systems and methods
10/13/16Utilizing semantic clusters to predict software defects
10/13/16Counter-based wide fetch management
10/13/16Counter-based wide fetch management
10/13/16Deferred metadata initialization
10/13/16Maintaining command order of address translation cache misses and subsequent hits
10/13/16Maintaining command order of address translation cache misses and subsequent hits
10/13/16Processing of events for accelerators utilized for parallel processing
10/13/16Universal serial bus (usb) filter hub
10/13/16Flexible analytics-driven webpage design and optimization
10/13/16Recombining incorrectly separated tokens in natural language processing
10/13/16Scoring unfielded personal names without prior parsing
10/13/16Scoring unfielded personal names without prior parsing
10/13/16Intelligent homepage tuning in a web browser
10/13/16Limiting tuple creation at the tuple level
10/13/16Content following content for providing updates to content leveraged in a deck
10/13/16Validating content from an original communication included in a new communication
10/13/16Fast creation of a master gfs2 file system
10/13/16Content following content for providing updates to content leveraged in a deck
10/13/16Database statistics based on transaction state
10/13/16Database statistics based on transaction state
10/13/16Incremental and collocated redistribution for expansion of online shared nothing database
10/13/16Limiting tuple creation at the tuple level
10/13/16Data ingestion process
10/13/16Data ingestion process
10/13/16Measuring and displaying facets in context-based conformed dimensional data gravity wells
10/13/16Automatic data interpretation and answering analytical questions with tables and charts
10/13/16Document retrieval using internal dictionary-hierarchies to adjust per-subject match results
10/13/16Contextually related sharing of commentary for different portions of an information base
10/13/16Concept analysis operations utilizing accelerators
10/13/16Evaluating an impact of a user's content utilized in a social network
10/13/16Crowd sourced f-pattern utilization for web page component placement optimization
10/13/16Optimizing placement of circuit resources using a globally accessible placement memory
10/13/16Medical clinical trial site identification
10/13/16Automatic data interpretation and answering analytical questions with tables and charts
10/13/16Aggregation of traffic impact metrics
10/13/16Predictive navigation
10/13/16Determining off-topic questions in a question answering system using probabilistic language models
10/13/16Risk-based order management with heterogeneous variables in a constrained environment
10/13/16Rating aggregation and propagation mechanism for hierarchical services and products
10/13/16System for observing and analyzing customer opinion
10/13/16Usage-based hardware or software upgrades
10/13/16Rating aggregation and propagation mechanism for hierarchical services and products
10/13/16Sychronized display of street view map and video stream
10/13/16Monitoring actions to conduct an activity between multiple participants
10/13/16Monitoring actions to conduct an activity between multiple participants
10/13/16Wearable device that warms and/or cools to notify a user
10/13/16Wearable device that warms and/or cools to notify a user
10/13/16Adjustable interpolation sampling interval for tape systems
10/13/16Polyhexahydrotriazine dielectrics
10/13/16Electromechanical assembly controlled by sensed voltage
10/13/16Scanning transmission electron microscope having multiple beams and post-detection image correction
10/13/16Scanning transmission electron microscope having multiple beams and post-detection image correction
10/13/16Work function metal fill for replacement gate fin field effect transistor process
10/13/16Semiconductor device having self-aligned gate contacts
10/13/16Liquid cooled compliant heat sink and related method
10/13/16Wafer with plated wires and method of fabricating same
10/13/16Activating reactions in integrated circuits through electrical discharge
10/13/16Low resistance contact for semiconductor devices
10/13/16Semiconductor-on-insulator (soi) lateral heterojunction bipolar transistor having an epitaxially grown base
10/13/16Semiconductor-on-insulator (soi) lateral heterojunction bipolar transistor having an epitaxially grown base
10/13/16Semiconductor structure with an l-shaped bottom plate
10/13/16Double layered transparent conductive oxide for reduced schottky barrier in photovoltaic devices
10/13/16In-situ annealing to improve the tunneling magneto-resistance of magnetic tunnel junctions
10/13/16Temperature insensitive external cavity lasers on silicon
10/13/16External cavity laser based wavelength division multiplexing superchannel transceivers
10/13/16Electromechanical assembly controlled by sensed voltage
10/13/16Three dimensional grid compression storage
10/13/16Method and apparatus for selective and power-aware memory error protection and memory management
10/13/16Identifying a location in a network where noise is generated
10/13/16Identifying a location in a network where noise is generated
10/13/16External cavity laser based wavelength division multiplexing superchannel transceivers
10/13/16Message broadcasting in a clustered computing environment
10/13/16Configuration command template creation assistant using cross-model analysis to identify common syntax and semantics
10/13/16Interconnect congestion control in a storage grid
10/13/16Handling potential service load interruptions by presenting action items for service requester to complete to increase time to address potential service load interruption
10/13/16Predictive computing resource allocation for distributed environments
10/13/16Controlling a delivery of messages to designated computing devices
10/13/16Sending an out-of-facility notification based on aggregated content from a task management system
10/13/16Identification to a recipient of an electronic communication of another user who has accessed the electronic communication
10/13/16Social conversation management
10/13/16Social conversation management
10/13/16Handling potential service load interruptions by presenting action items for service requester to complete to increase time to address potential service load interruption
10/13/16Automated remote message management
10/13/16Provisioning data to distributed computing systems
10/13/16Recovery of a network infrastructure to facilitate business continuity
10/13/16Identifying a contact based on a voice communication session
10/13/16Location aware photograph recommendation notification
10/13/16Personal video recording with messaging
10/13/16Enabling near field communications using indicators
10/13/16Monitoring unauthorized access point
10/13/16Locating computer-controlled entities
10/06/16Heat sink structure with a vapor-permeable membrane for two-phase cooling
10/06/16Desalination system and method for desalination
10/06/16Burst resistant thin wall heat sink
10/06/16Flexible cold plate with enhanced flexibility
10/06/16Verifying a road network of a map
10/06/16Linear projection-based navigation
10/06/16Route stabilization scrolling mode
10/06/16Route stabilization scrolling mode
10/06/16Predicting semiconductor package warpage
10/06/16System and method for air-pollutant source-localization using parked motor vehicles
10/06/16System and method for air-pollutant source-localization using parked motor vehicles
10/06/16Method for fabricating a semiconductor device for use in an optical application
10/06/16Implementing a restricted-operation region for unmanned vehicles
10/06/16Implementing a restricted-operation region for unmanned vehicles
10/06/16Dynamic collaborative adjustable keyboard
10/06/16Customizing input device operation
10/06/16Emulating pressure sensitivity on multi-touch devices
10/06/16Associating a post with a goal
10/06/16Associating a post with a goal
10/06/16Nonvolatile memory interface for metadata shadowing
10/06/16Performance-based grouping of storage devices in a storage system
10/06/16Storage pool capacity management
10/06/16Reference counting for memory areas
10/06/16Determining weight values for storage devices in a storage tier to use to select one of the storage devices to use as a target storage to which data from a source storage is migrated
10/06/16Synchronous extent migration protocol for paired storage
10/06/16Implicit coordination for deployment of computing systems using a data sharing service
10/06/16Adaptive map-reduce pipeline with dynamic thread allocations
10/06/16Employing code overlays to facilitate software development
10/06/16Initiating use of software as part of a messaging window
10/06/16Deploying incremental scripts
10/06/16Enterprise wide software version recommendation
10/06/16Deploying incremental scripts
10/06/16Adaptive map-reduce pipeline with dynamic thread allocations
10/06/16Multithreading in vector processors
10/06/16Configuration checker for application
10/06/16Migrating virtual machines based on relative priority of virtual machine in the context of a target hypervisor environment
10/06/16Migrating virtual machines based on relative priority of virtual machine in the context of a target hypervisor environment
10/06/16Setting retransmission time of an application client during virtual machine migration
10/06/16Api matchmaking using feature models
10/06/16Apparatus, system and method for data collection, import and modeling
10/06/16Securing crash dump files
10/06/16Error protection of data stored using variable-length headers
10/06/16Error protection of data stored using variable-length headers
10/06/16Raid 10 reads optimized for solid state drives
10/06/16Clone file backup and restore
10/06/16Clone file backup and restore
10/06/16Recovery of a transaction after xa end
10/06/16Dynamic tracing framework for debugging in virtualized environments
10/06/16Utilizing semantic clusters to predict software defects
10/06/16Conservative garbage collection and access protection
10/06/16Reference counting for memory areas
10/06/16Selective purging of pci i/o address translation buffer
10/06/16Selective space reclamation of data storage memory employing heat and relocation metrics
10/06/16Caching scheme synergy for extent migration between tiers of a storage system
10/06/16Protecting storage from unauthorized access
10/06/16Protecting contents of storage
10/06/16Protecting contents of storage
10/06/16Dynamic storage key assignment
10/06/16Multithreading in vector processors
10/06/16Legacy document converter for a mobile device
10/06/16Legacy document converter for a mobile device
10/06/16Parallel parsing of markup language data
10/06/16Parallel parsing of markup language data
10/06/16Identification of examples in documents
10/06/16Efficient tracking of an alternate global update and read values using exception lists
10/06/16Efficient database management
10/06/16Bounding or limiting data sets for efficient searching by leveraging location data
10/06/16Anticipatory query completion by pattern detection
10/06/16Generation of realistic file content changes for deduplication testing
10/06/16Non-disruptive file system element reconfiguration on disk expansion
10/06/16Activity based analytics
10/06/16Dynamically maintaining data structures driven by heterogeneous clients in a distributed data collection system
10/06/16Dynamically adjusting statistics collection time in a database management system
10/06/16Data filtering using a plurality of hardware accelerators
10/06/16Data filtering using a plurality of hardware accelerators
10/06/16Efficient tracking of an alternate global update and read values using exception lists
10/06/16Supporting multi-tenant applications on a shared database using pre-defined attributes
10/06/16Vertically partitioned databases
10/06/16Anticipatory query completion by pattern detection
10/06/16Generating multiple query access plans for multiple computing environments
10/06/16Generating multiple query access plans for multiple computing environments
10/06/16Generating multiple query access plans for multiple computing environments
10/06/16Generating multiple query access plans for multiple computing environments
10/06/16Change tracking for structured languages
10/06/16Dynamically adjusting statistics collection time in a database management system
10/06/16Supporting multi-tenant applications on a shared database using pre-defined attributes
10/06/16Model-based design for transforming data
10/06/16User initiated replication in a synchronized object replication system
10/06/16Prioritizing rebuilding of encoded data slices
10/06/16Collaborative data intelligence between data warehouse models and big data stores
10/06/16Providing multiple concurrent transactions on a single database schema using a single concurrent transaction database infrastructure
10/06/16Aggregation of web interactions for personalized usage
10/06/16Pattern based audio searching method and system
10/06/16Techniques for filtering content presented in a web browser using content analytics
10/06/16Dynamic data collection
10/06/16Change tracking for structured languages
10/06/16Accessing objects in a service registry and repository
10/06/16Distribution of metadata for importation
10/06/16Predicting process fail limits
10/06/16Mandating tasks at run-time for case management
10/06/16Enabling enforcement of licensing terms in distributing content in containers by including a key in the container containing the pertinent licensing terms
10/06/16Managing software deployment
10/06/16Managing access to device content
10/06/16Protecting storage from unauthorized access
10/06/16Differential hierarchical-based password security mechanism for mobile device
10/06/16Hybrid tag for radio frequency identification system
10/06/16Determining access permission
10/06/16Identifying updated content in images
10/06/16Field verification of documents
10/06/16Transform architecture for multiple neurosynaptic core circuits
10/06/16Reconfigurable and customizable general-purpose circuits for neural networks
10/06/16Enhancing natural language processing query/answer systems using social network analysis
10/06/16Enhancing natural language processing query/answer systems using social network analysis
10/06/16Cognitive monitoring
10/06/16Question answering system-based generation of distractors using machine learning
10/06/16Generation of social business insights by fractal analysis
10/06/16Calendar management with flexible duration meetings
10/06/16Optimization of workload placement
10/06/16Mandating tasks at run-time for case management
10/06/16Automatically identifying a project's staffing-availability risk
10/06/16Calendar management with flexible duration meetings
10/06/16Parking facility occupancy management using retail incentives
10/06/16Parking facility occupancy management using retail incentives
10/06/16Alert sound alteration
10/06/16Lighting control for location finding
10/06/16Lighting control for location finding
10/06/16Detecting and notifying of various potential hazards
10/06/16Alert sound alteration
10/06/16Cognitive monitoring
10/06/16Question answering system-based generation of distractors using machine learning
10/06/16Customizable and individualized speech recognition settings interface for users with language accents
10/06/16Determining estimated position information of a magnetic recording tape using media thickness estimation
10/06/16System to distinguish between visually identical objects
10/06/16System to distinguish between visually identical objects
10/06/16Efficient multichannel data format using variable-length headers
10/06/16Efficient multichannel data format using variable-length headers
10/06/16Nonvolatile memory interface for metadata shadowing
10/06/16Dielectric filling materials with ionic compounds
10/06/16Finfet device with vertical silicide on recessed source/drain epitaxy regions
10/06/16Protected through semiconductor via (tsv)
10/06/16Stable multiple threshold voltage devices on replacement metal gate cmos devices
10/06/16Stable multiple threshold voltage devices on replacement metal gate cmos devices
10/06/16Method for making strained semiconductor device and related methods
10/06/16Soldering three dimensional integrated circuits
10/06/16Technique for fabrication of microelectronic capacitors and resistors
10/06/16Selectively degrading current resistance of field effect transistor devices
10/06/16Hybrid finfet/nanowire sram cell using selective germanium condensation
10/06/16Selectively degrading current resistance of field effect transistor devices
10/06/16Finfet device having a high germanium content fin structure and method of making same
10/06/16Self-aligned vertical cnt array transistor
10/06/16Forming multi-stack nanowires using a common release material
10/06/16Hybrid aspect ratio trapping
10/06/16Finfet semiconductor devices with stressed channel regions
10/06/16Replacement metal gate dielectric cap
10/06/16Forming multi-stack nanowires using a common release material
10/06/16Damage-resistant fin structures and finfet cmos
10/06/16Finfet devices with multiple channel lengths
10/06/16Finfets having strained channels, and methods of fabricating finfets having strained channels
10/06/16Optoelectronic devices with back contact
10/06/16Integrated circuit cooling using embedded peltier micro-vias in substrate
10/06/16Integrated circuit cooling using embedded peltier micro-vias in substrate
10/06/16Transister devices with tapered suspended vertical arrays of carbon nanotubes
10/06/16Propagation velocity tuning with functionalized carbon nanomaterial in printed wiring boards (pwbs) and other substrates, and design structures for same
10/06/16Dynamic prescaling for performance counters
10/06/16Path encoding and decoding
10/06/16Parallel route reservation for wireless technologies
10/06/16Hybrid tag for radio frequency identification system
10/06/16Determining sampling rate from randomly sampled events
10/06/16Dynamic tracing framework for debugging in virtualized environments
10/06/16Dynamic service orchestration within paas platforms
10/06/16Handling instant message delivery media to end user
10/06/16Modification of electronic messages
10/06/16Modification of electronic messages
10/06/16Selective forwarding of components of an attached archive in email system
10/06/16Automatic determination of additional languages used in social networks
10/06/16Client side social network response tracking
10/06/16Enhanced security when sending asynchronous messages
10/06/16Enhanced security when sending asynchronous messages
10/06/16Unauthorized account access lockout reduction
10/06/16Virus-release-date-based priority virus scanning
10/06/16Scaling a trusted computing model in a globally distributed cloud environment
10/06/16Command processing in distributed computing systems
10/06/16Modifying storage capacity of a set of storage units
10/06/16Generation of content recommendations
10/06/16Reusable message flow between applications of a message broker integrated systems environment
10/06/16Implicit coordination for deployment of computing systems using a data sharing service
10/06/16Highly resilient protocol servicing in network-attached storage
10/06/16System and method for providing profile enhancement using scheduling information
10/06/16Video data filtering
10/06/16Locating misplaced mobile computing devices
10/06/16Handling instant message delivery media to end user
10/06/16Flexible coolant manifold - heat sink assembly
10/06/16Liquid-cooled heat sink configured to facilitate drainage
10/06/16Liquid-cooled heat sink configured to facilitate drainage
09/29/16Monitoring a person for indications of a brain injury
09/29/16Monitoring a person for indications of a brain injury
09/29/16Monitoring a person for indications of a brain injury
09/29/16Monitoring a person for indications of a brain injury
09/29/16Monitoring a person for indications of a brain injury
09/29/16Monitoring a person for indications of a brain injury
09/29/16Microfluidic device with longitudinal and transverse liquid barriers for transverse flow mixing
09/29/16Targeted sequencing of biomolecules by pulling through a liquid-liquid interface with an atomic force microscope
09/29/16Gauge for installation of liners in substrate spin coating tools
09/29/16Predictive navigation
09/29/16Verifying a road network of a map
09/29/16Methods and apparatus for localizing a source of a set of radio signals
09/29/16Managing access to data on a client device during low-power state
09/29/16Managing access to data on a client device during low-power state
09/29/16Visual representation of an email chain
09/29/16Analyzing email threads
09/29/16Intelligent interactive screen capture
09/29/16Intelligent interactive screen capture
09/29/16Optimization of disk images for thin provisioned disks
09/29/16Optimization of disk images for thin provisioned disks
09/29/16Parallel processes for performing multiple incremental copies
09/29/16Managing sequentiality of tracks for asynchronous pprc tracks on secondary
09/29/16Conflict management for application directed data placement in storage environments
09/29/16File system block-level tiering and co-allocation
09/29/16Accessing global data from accelerator devices
09/29/16Computer memory data security
09/29/16Security for memory module data
09/29/16Computer memory data security
09/29/16Accessing global data from accelerator devices
09/29/16Method of generating end-to-end web application from tooling
09/29/16Multiple touch selection control
09/29/16Program structure-based blocking
09/29/16Unaligned instruction relocation
09/29/16Program structure-based blocking
09/29/16Unaligned instruction relocation
09/29/16Schedulers with load-store queue awareness
09/29/16Code optimization to enable and disable coalescing of memory transactions
09/29/16Service-based integration of application patterns
09/29/16Determining importance of an artifact in a software development environment
09/29/16Increasing accuracy of traceability links and structured data
09/29/16Multifunctional hexadecimal instruction form system and program product
09/29/16History buffer with single snoop tag for multiple-field registers
09/29/16Schedulers with load-store queue awareness
09/29/16Application documentation effectiveness monitoring and feedback
09/29/16Integrated parameter control with persistence indication
09/29/16Sharing memory between guests
09/29/16Sharing memory between guests
09/29/16Dispatching function calls across accelerator devices
09/29/16Flow topology of computer transactions
09/29/16Method and system for dynamic pool reallocation
09/29/16Selecting resource allocation policies and resolving resource conflicts
09/29/16Dynamic workload deployment for data integration services
09/29/16Dynamic workload deployment for data integration services
09/29/16Optimization of map-reduce shuffle performance through shuffler i/o pipeline actions and planning
09/29/16Synchronizing control and output of computing tasks
09/29/16Synchronizing control and output of computing tasks
09/29/16Integrated parameter control with persistence indication
09/29/16Granular event management for service platforms
09/29/16Dispatching function calls across accelerator devices
09/29/16Concurrent error detection in a ternary content-addressable memory (tcam) device
09/29/16Concurrent error detection in a ternary content-addressable memory (tcam) device
09/29/16Error checking and correction for nand flash devices
09/29/16Memory system with robust backup and restart features and removable modules
09/29/16User initiated replication in a synchronized object replication system
09/29/16Pooling work across multiple transactions for reducing contention in operational analytics systems
09/29/16Utilizing a processor with a time of day clock error
09/29/16Utilizing a processor with a time of day clock error
09/29/16Identification of storage performance shortfalls
09/29/16Identifying severity of test execution failures by analyzing test execution logs
09/29/16Searching code based on learned programming construct patterns and nlp similarity
09/29/16Determining importance of an artifact in a software development environment
09/29/16Increasing accuracy of traceability links and structured data
09/29/16Searching code based on learned programming construct patterns and nlp similarity
09/29/16Extraction of problem diagnostic knowledge from test cases
09/29/16Identifying severity of test execution failures by analyzing test execution logs
09/29/16Scalable cloud storage architecture
09/29/16Store operations to maintain cache coherence
09/29/16Store operations to maintain cache coherence
09/29/16Demote instruction for relinquishing cache line ownership
09/29/16Data compression accelerator methods, apparatus and design structure with improved resource utilization
09/29/16Communication mode control for wearable devices
09/29/16Effective memory management for host objects in a runtime environment with embedded garbage-collected based dynamic language
09/29/16Simd implementation of stencil codes
09/29/16Accessing location-based information on a mobile device
09/29/16Form filling using a data mark
09/29/16Ontology driven dictionary generation and ambiguity resolution for natural language processing
09/29/16Context based synonym filtering for natural language processing systems
09/29/16Context-aware cognitive processing
09/29/16Recommending connections in a social network system
09/29/16Optimizing space management of tablespaces in database systems
09/29/16Efficiency of file synchronization in a linear tape file system
09/29/16Systems and methods for query evaluation over distributed linked data stores
09/29/16Enhanced conversion between geohash codes and corresponding longitude/latitude coordinates
09/29/16Matching untagged data sources to untagged data analysis applications
09/29/16Matching untagged data sources to untagged data analysis applications
09/29/16Schema generation using natural language processing
09/29/16Schema generation using natural language processing
09/29/16Efficient full delete operations
09/29/16Alert management
09/29/16Table organization using one or more queries
09/29/16Index building in response to data input
09/29/16Index building in response to data input
09/29/16Fast multi-tier indexing supporting dynamic update
09/29/16Concurrent reads and inserts into a data structure without latching or waiting by readers
09/29/16Enterprise knowledge and reference data driven persistence in hybrid master data management
09/29/16Generation of service specification of a solution
09/29/16Efficient full delete operations
09/29/16Query strength indicator
09/29/16Recommending connections in a social network system
09/29/16Systems and methods for query evaluation over distributed linked data stores
09/29/16Community policing via multi-platform integration
09/29/16Bootstrapping the data lake and glossaries with 'dataset joins' metadata from existing application patterns
09/29/16Leveraging enterprise content
09/29/16Mapping relationships using electronic communications data
09/29/16Utilizing attributes of users to cluster users at a waypoint
09/29/16Determining answers to questions using a hierarchy of question and answer pairs
09/29/16Augmenting search queries based on personalized association patterns
09/29/16Search of web page metadata using a find function
09/29/16Relevancy assessment and visualization of biological pathways
09/29/16Process-metrology reproducibility bands for lithographic photomasks
09/29/16Optimizing placement of circuit resources using a globally accessible placement memory
09/29/16Circuit routing based on total negative slack
09/29/16Circuit routing based on total negative slack
09/29/16Collapsing terms in statistical static timing analysis
09/29/16Securing protected health information based on software designation
09/29/16Relevancy assessment and visualization of biological pathways
09/29/16Identifying and ranking individual-level risk factors using personalized predictive models
09/29/16Identifying and ranking individual-level risk factors using personalized predictive models
09/29/16Secure connected digital media platform
09/29/16Security within a software-defined infrastructure
09/29/16System and method for enhanced display-screen security and privacy
09/29/16Privacy and modeling preserved data sharing
09/29/16Securing protected health information based on software designation
09/29/16Privacy and modeling preserved data sharing
09/29/16Electronic data security apparatus
09/29/16Managing digital photograph metadata anonymization
09/29/16Detection of steganography on the perimeter
09/29/16Methods and apparatus for localizing a source of a set of radio signals
09/29/16Environmental-based location monitoring
09/29/16Compositional prototypes for scalable neurosynaptic networks
09/29/16Assistive technology (at) responsive to cognitive states
09/29/16Assistive technology (at) responsive to cognitive states
09/29/16Automated decision support provenance and simulation
09/29/16Automated decision support provenance and simulation
09/29/16Network management based on modeling of cascading effect of failure
09/29/16Determining off-topic questions in a question answering system using probabilistic language models
09/29/16Reducing graphical text analysis using physiological priors
09/29/16Fingerprinting and matching log streams
09/29/16Fingerprinting and matching log streams
09/29/16Reducing graphical text analysis using physiological priors
09/29/16Multimodal data fusion by hierarchical multi-view dictionary learning
09/29/16Identifying optimum times at which to retrain a logistic regression model
09/29/16Intelligent spatial enterprise analytics
09/29/16Failure modeling by incorporation of terrestrial conditions
09/29/16Dynamic construction of cloud services
09/29/16Demand-supply matching with a time and virtual space network
09/29/16Failure modeling by incorporation of terrestrial conditions
09/29/16Transforming social media re-shares to track referrer history and identify influencers
09/29/16Demand-supply matching with a time and virtual space network
09/29/16System and method for cognitive computing incentive framework
09/29/16Tracking responses to promotions
09/29/16Trust calculator for peer-to-peer transactions
09/29/16Predictive financial management system
09/29/16Predictive financial management system
09/29/16Using a bending pattern to arrange files on a flexible display
09/29/16Multi-cue object detection and analysis
09/29/16Geometric shape hierarchy determination to provide visualization context
09/29/16Path visualization for augmented reality display device based on received data and probabilistic analysis
09/29/16Individualized content in augmented reality systems
09/29/16Recommending an alternative route to a service location to service a vehicle issue that was detected by a change in status in a sensor of the automobile's diagnostic system
09/29/16Access authorization based on physical location
09/29/16Access authorization based on physical location
09/29/16Vehicle-based abnormal travel event detecting and reporting
09/29/16Geometric shape hierarchy determination to provide visualization context
09/29/16Automatic accuracy estimation for audio transcriptions
09/29/16Speech summarization program
09/29/16Mass production of multichannel current perpendicular to plane head modules via preferred milling
09/29/16Arbitration for memory diagnostics
09/29/16High resistivity soft magnetic material for miniaturized power converter
09/29/16Spalling using dissolvable release layer
09/29/16Fin trimming in a double sit process
09/29/16Thermoplastic temporary adhesive for silicon handler with infra-red laser wafer de-bonding
09/29/16Thermoplastic temporary adhesive for silicon handler with infra-red laser wafer de-bonding
09/29/16Fin end spacer for preventing merger of raised active regions
09/29/16Buried source-drain contact for integrated circuit transistor devices and method of making same
09/29/16Macro to monitor n-p bump
09/29/16Techniques for dual dielectric thickness for a nanowire cmos technology using oxygen growth
09/29/16Silicon-germanium finfet device with controlled junction
09/29/16Dual channel finfet with relaxed pfet region
09/29/16Multi-stacked electronic device with defect-free solder connection
09/29/16Semiconductor structures having low resistance paths throughout a wafer
09/29/16Secure chip with physically unclonable function
09/29/16Method of forming epitaxial buffer layer for finfet source and drain junction leakage reduction
09/29/16Trench to trench fin short mitigation
09/29/16Adjacent strained <100> nfet fins and <110> pfet fins
09/29/16High resistivity iron-based, thermally stable magnetic material for on-chip integrated inductors
09/29/16High resistivity iron-based, thermally stable magnetic material for on-chip integrated inductors
09/29/16High resistivity soft magnetic material for miniaturized power converter
09/29/16Iii-v compound and germanium compound nanowire suspension with germanium-containing release layer
09/29/16Techniques for multiple gate workfunctions for a nanowire cmos technology
09/29/16Replacement metal gate structures
09/29/16Symmetrical extension junction formation with low-k spacer and dual epitaxial process in finfet device
09/29/16Method for making a semiconductor device with sidewal spacers for confinig epitaxial growth
09/29/16Group iii nitride integration with cmos technology
09/29/16Gate-all-around fin device
09/29/16Nano-ribbon channel transistor with back-bias control
09/29/16Tunable voltage margin access diodes
09/29/16Silicon heterojunction photovoltaic device with wide band gap emitter
09/29/16Heterostructure germanium tandem junction solar cell
09/29/16Simplified process for vertical led manufacturing
09/29/16Back contact led through spalling
09/29/16Simplified process for vertical led manufacturing
09/29/16Perpendicular magnetic anisotropy bcc multilayers
09/29/16Perpendicular magnetic anisotropy bcc multilayers
09/29/16Tunable voltage margin access diodes
09/29/16Boosting varactor capacitance ratio
09/29/16Voltage controlled oscillator runaway prevention
09/29/16Voltage controlled oscillator runaway prevention
09/29/16Polymorphic encryption key allocation scheme
09/29/16Logical multicasting in overlay networks
09/29/16Supporting low latency applications at the edge of wireless communication networks
09/29/16Network management based on modeling of cascading effect of failure
09/29/16Network management based on assessment of topological robustness and criticality of assets
09/29/16Network management based on assessment of topological robustness and criticality of assets
09/29/16Network management using hierarchical and multi-scenario graphs
09/29/16Network management using hierarchical and multi-scenario graphs
09/29/16Optimizing log analysis in saas environments
09/29/16Outcome-based software-defined infrastructure
09/29/16Leader device selection in control clusters using shared vlan
09/29/16Leader device selection in control clusters using shared vlan
09/29/16Supporting low latency applications at the edge of wireless communication networks
09/29/16Propagating a flow policy by control packet in a software defined network (sdn) based network
09/29/16Overlay network priority inheritance
09/29/16Selecting subsets of participants in electronic message threads
09/29/16Dynamic thread management for online conversations
09/29/16Analyzing email threads
09/29/16Dynamic adaption of electronic routing slips for financial messaging
09/29/16Selecting subsets of participants in electronic message threads
09/29/16Virtual firewall load balancer
09/29/16Creating network isolation between virtual machines
09/29/16Virtual firewall load balancer
09/29/16Runtime instantiation of broadcast encryption schemes
09/29/16Preview serving from an external preview service
09/29/16Geographical location authentication
09/29/16Environmental-based location monitoring
09/29/16Geographical location authentication
09/29/16System and method for enhanced display-screen security and privacy
09/29/16Macro grid governance and communication
09/29/16Creating network isolation between virtual machines
09/29/16Seamlessly conferencing a previously-connected telephone call
09/29/16Managing access to data on a client device during low-power state
09/29/16Intelligent spatial enterprise analytics
09/29/16Capability-based abstraction of software-defined infrastructure
09/29/16Network communication between virtual machine applications via direct memory access
09/29/16Method, computer program and computer for estimating location based on social media
09/29/16Collaborative based caching
09/29/16Collaborative based caching
09/29/16Leveraging mobile devices to enforce restricted area security
09/29/16Secure mobile device recovery
09/29/16Organizing conference calls using speaker and topic hierarchies
09/29/16Multi-device monitoring and control using intelligent device channel sharing
09/29/16Noise reduction in a microphone using vowel detection
09/29/16Accessing location-based information on a mobile device
09/29/16Communicating normative output settings of computing devices of users within a social locale
09/29/16Multi-device monitoring and control using intelligent device channel sharing
09/29/16Leveraging mobile devices to enforce restricted area security
09/29/16Communicating normative output settings of computing devices of users within a social locale
09/29/16Glass interposer with thermal vias
09/29/16Positive pressure-applying latch mechanism
09/29/16Glass interposer with embedded thermoelectric devices
09/22/16Microfluidic device with anti-wetting, venting areas
09/22/16Runtime change of surface parameters in 3d printing
09/22/16Battery optimization
09/22/16Wiper control mechanism
09/22/16Sample assembly with an electromagnetic field to accelerate the bonding of target antigens and nanoparticles
09/22/16Sample assembly with an electromagnetic field to accelerate the bonding of target antigens and nanoparticles
09/22/16System and method for identifying significant and consumable-insensitive trace features
09/22/16Autonomous data evacuation
09/22/16Two-phase cooling with ambient cooled condensor
09/22/16Mobile gesture reporting and replay with unresponsive gestures identification and analysis
09/22/16Intelligent taskbar shortcut menu for webpage control
09/22/16Mobile gesture reporting and replay with unresponsive gestures identification and analysis
09/22/16Server based disaster recovery by making use of dual write responses
09/22/16Increase memory scalability using table-specific memory cleanup
09/22/16Accelerated non-volatile memory recirculation processing
09/22/16Generalized storage allocation for multiple architectures
09/22/16Sharing of classes for modular programs in a multi-tenant environment
09/22/16Isolated program execution environment
09/22/16Seal-based regulation for software deployment management
09/22/16Performing code load operations on managed components in a system
09/22/16Generating and applying patches to computer program code concurrently with its execution
09/22/16Extending the usage of integrated portals for a better user experience
09/22/16Extending the usage of integrated portals for a better user experience
09/22/16Performing a clear operation absent host intervention
09/22/16Sharing of classes for modular programs in a multi-tenant environment
09/22/16Virtual machine migration between hypervisor virtual machines and containers
09/22/16Feedback analysis for virtual machines manager scheduling
09/22/16Managing a set of assets for a user in a shared pool of configurable computing resources
09/22/16Optimizing the initialization of a queue via a batch operation
09/22/16Managing a set of assets for a user in a shared pool of configurable computing resources
09/22/16Dynamic management of computing platform resources
09/22/16Energy efficient supercomputer job allocation
09/22/16Inter-process communication in a multi-tenant environment
09/22/16Data synchronization of block-level backup
09/22/16Data synchronization of block-level backup
09/22/16Managing remote data replication
09/22/16Independent hardware operating state transitions by a test unit
09/22/16Independent hardware operating state transitions by a test unit
09/22/16Method to efficiently implement synchronization using software managed address translation
09/22/16Adopting an existing automation script to a new framework
09/22/16Programmable memory mapping scheme with interleave properties
09/22/16Preventing software thread blocking due to interrupts
09/22/16Preventing software thread blocking due to interrupts
09/22/16Embedded content suitability scoring
09/22/16Providing a recovery placeholder within an application
09/22/16Embedded content suitability scoring
09/22/16Managing the display of application forms
09/22/16Enhanced document input parsing
09/22/16Parallel build of non-partitioned join hash tables and non-enforced n:1 join hash tables
09/22/16Inter-process communication in a multi-tenant environment
09/22/16Automated identification of complex transformations and generation of subscriptions for data
09/22/16System and method for creating a preference profile from shared images
09/22/16Index traversals utilizing alternate in-memory search structure and system memory costing
09/22/16Accessing and editing virtually-indexed message flows using structured query langauge (sql)
09/22/16Establishing a chain of trust in a system log
09/22/16Establishing a chain of trust in a system log
09/22/16Establishing transaction metadata
09/22/16Index traversals utilizing alternate in-memory search structure and system memory costing
09/22/16Efficient join on dynamically compressed inner for improved fit into cache hierarchy
09/22/16Lightweight table comparison
09/22/16Policy based data collection, processing, and negotiation for analytics
09/22/16Automated identification of complex transformations and generation of subscriptions for data replication
09/22/16Managing remote data replication
09/22/16Distributed iceberg cubing over ordered dimensions
09/22/16Friend locator based on friend network and profile
09/22/16Arranging and displaying content from a social media feed based on relational metadata
09/22/16Event recommendation system and method
09/22/16Efficient performance of insert and point query operations in a column store
09/22/16Identifying content in an incoming message on a social network
09/22/16Automating generation of messages in accordance with a standard
09/22/16Event recommendation system and method
09/22/16Shared url content update to improve search engine optimization
09/22/16Physical aware technology mapping in synthesis
09/22/16Physical aware technology mapping in synthesis
09/22/16Modeling the performance of a field effect transistor having a dynamically depleted channel region
09/22/16Selectively blocking content on electronic displays
09/22/16Securing a device using graphical analysis
09/22/16Proximity based authentication for striped data
09/22/16Isolated program execution environment
09/22/16Securing a device using graphical analysis
09/22/16Facial image bucketing with expectation maximization and facial coordinates
09/22/16System and method for creating a preference profile from shared images
09/22/16Implementing a neural network algorithm on a neurosynaptic substrate based on metadata associated with the neural network algorithm
09/22/16Multi-scale spatio-temporal neural network system
09/22/16Cardinality estimation using artificial neural networks
09/22/16Road condition management
09/22/16Function-based automatic evaluation of a computer environment
09/22/16Inquiry-based adaptive prediction
09/22/16Crowdsourcing of meetings
09/22/16Calendar adjusting device
09/22/16Tracking use of a virtualization service according to globalization characteristic based usage
09/22/16Mining unstructured online content for automated currency value conversion
09/22/16Data breach detection
09/22/16Multi-point authentication for payment transactions
09/22/16Multi-point authentication for payment transactions
09/22/16Multi-point authentication for payment transactions
09/22/16Multi-point authentication for payment transactions
09/22/16Multi-point authentication for payment transactions
09/22/16Multi-point authentication for payment transactions
09/22/16Authenticating a request for an electronic transaction
09/22/16Dynamic cloud solution catalog
09/22/16Video sequence assembly
09/22/16Data interpretation overlay mechanism
09/22/16Recommending bending lines on flexible displays
09/22/16Asset-based weather and event alerts
09/22/16Syncronized traffic warning signal system
09/22/16Presenting data in a graphical overlay
09/22/16Synthesizing an aggregate voice
09/22/16Speech retrieval method, speech retrieval apparatus, and program for speech retrieval apparatus
09/22/16Speech retrieval method, speech retrieval apparatus, and program for speech retrieval apparatus
09/22/16Patterning process
09/22/16Method to improve finfet cut overlay
09/22/16Ultrathin multilayer metal alloy liner for nano cu interconnects
09/22/16Diffusion barrier layer formation
09/22/16Magnetic trap for cylindrical diamagnetic materials
09/22/16Low-cost soi finfet technology
09/22/16Non-destructive, wafer scale method to evaluate defect density in heterogeneous epitaxial layers
09/22/16Mis (metal-insulator-semiconductor) contact structures for semiconductor devices
09/22/16Ultrathin multilayer metal alloy liner for nano cu interconnects
09/22/16Optoelectronics and cmos integration on goi substrate
09/22/16Finfet including tunable fin height and tunable fin width ratio
09/22/16Wire-last gate-all-around nanowire fet
09/22/16Asymmetric fet
09/22/16Divot-free planarization dielectric layer for replacement gate
09/22/16Method of forming epitaxial buffer layer for finfet source and drain junction leakage reduction
09/22/16Forming low parasitic trim gate last mosfet
09/22/16Formation of finfet junction
09/22/16Capping layers for improved crystallization
09/22/16Led light extraction enhancement enabled using self-assembled particles patterned surface
09/22/16Method of forming an on-pitch self-aligned hard mask for contact to a tunnel junction using ion beam etching
09/22/16Led light extraction enhancement enabled using self-assembled particles patterned surface
09/22/16Package structures having integrated waveguides for high speed communications between package components
09/22/16Package structures having integrated waveguides for high speed communications between package components
09/22/16Monolithic integrated photonics with lateral bipolar and bicmos
09/22/16Voltage charge pump with segmented boost capacitors
09/22/16Software version maintenance in a software defined network
09/22/16Physical change tracking system for enclosures within data centers
09/22/16High performance topology resolution for non-instrumented nodes
09/22/16Optimizing allocation of multi-tasking servers
09/22/16Predicting hardware failures in a server
09/22/16Dynamic community support
09/22/16Dynamic management of computing platform resources
09/22/16Dynamic management of computing platform resources
09/22/16Dynamic management of computing platform resources
09/22/16Dynamic management of computing platform resources
09/22/16Dynamic management of computing platform resources
09/22/16Inquiry-based adaptive prediction
09/22/16Switch and select topology for photonic switch fabrics and a method and system for forming same
09/22/16System and method for discovery and early notification of future unavailability
09/22/16Action assignment and tracking functionality for email
09/22/16Auto clean-up of unused email rules
09/22/16Using content based routing to scale cast iron like appliances
09/22/16Auto clean-up of unused email rules
09/22/16Techniques for filtering content presented in a web browser using content analytics
09/22/16Building or enhancing a relationship between users of a communications network
09/22/16Building or enhancing a relationship between users of a communications network
09/22/16Restricted content publishing with search engine registry
09/22/16Restricted content publishing with search engine registry
09/22/16File and bit location authentication
09/22/16Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history
09/22/16Mechanism to augment ips/siem evidence information with process history snapshot and application window capture history
09/22/16Image file transmission
09/22/16Optimizing resource downloads or streams using a collection of trusted network connected endpoints
09/22/16Entity registration in multiple dispersed storage networks
09/22/16Tracking use of a virtualization service according to globalization characteristic based usage
09/22/16Social content aggregation
09/22/16Automatically generating web conference recording bookmarks based on user analytics
09/22/16Bulk uploading of multiple self-referencing objects
09/22/16Splitting of processing logics associated with commands of pages in a distributed application
09/22/16Controlling mute function on telephone
09/22/16Seamlessly conferencing a previously-connected telephone call
09/22/16Gathering information for members of call
09/22/16Switch and select topology for photonic switch fabrics and a method and system for forming same
09/22/16Two-phase cooling with ambient cooled condensor
09/15/16Food steganography
09/15/16Sulfur scavenging materials
09/15/16Micro-electro-mechanical system (mems) structures and design structures
09/15/16Micro-electro-mechanical system (mems) structures and design structures
09/15/16Micro-electro-mechanical system (mems) structures and design structures
09/15/16Multilayer graphene structure reinforced with polyaromatic interstitial layers
09/15/16Controlling fragmentation of chemically strengthened glass
09/15/16Polyhemiaminal and polyhexahydrotriazine materials from 1,4 conjugate addition reactions
09/15/16Polyhemiaminal and polyhexahydrotriazine materials from 1,4 conjugate addition reactions
09/15/16Multilayer graphene structure reinforced with polyaromatic interstitial layers
09/15/16Working fluid for a device, device and method for converting heat into mechanical energy
09/15/16Sensor arrangement for position sensing
09/15/16Sensor arrangement for position sensing
09/15/16Measurement for transistor output characteristics with and without self heating
09/15/16Measurement for transistor output characteristics with and without self heating
09/15/16Dual-use electro-optic and thermo-optic modulator
09/15/16Controlled-capacitance full-depletion interdigitated pin modulator
09/15/16Controlled-capacitance full-depletion interdigitated pin modulator
09/15/16Device and method for reconfigurable power conversion
09/15/16Device and method for reconfigurable power conversion
09/15/16Calendar-based social network engagement
09/15/16Multi-selector contextual action paths
09/15/16Presenting data in a graphical overlay
09/15/16Optimization of the copying of change recorded data by using spare flash capacity
09/15/16Selecting pages implementing leaf nodes and internal nodes of a data set index for reuse
09/15/16Free space collection in log structured storage systems
09/15/16Deduplication tracking for accurate lifespan prediction
09/15/16Optimization of in-memory data grid placement
09/15/16Privilege based memory pinning mechanism
09/15/16Method of detecting tampering of data in tape drive, and file system
09/15/16Modifying a dispersed storage network memory data access response plan
09/15/16Applying a maximum size bound on content defined segmentation of data
09/15/16Complex computer environment installation
09/15/16Intelligent mobile application update
09/15/16Intelligent mobile application update
09/15/16Complex computer environment installation
09/15/16Smart source code review system
09/15/16Instruction to load data up to a dynamically determined memory boundary
09/15/16Instruction to load data up to a dynamically determined memory boundary
09/15/16Saving/restoring selected registers in transactional processing
09/15/16Remote power down control of a device
09/15/16Data assignment and data scheduling for physical machine in a virtual machine environment
09/15/16Feedback analysis for virtual machines manager scheduling
09/15/16Transaction begin/end instructions
09/15/16Managing resources of a shared pool of configurable computing resources
09/15/16Managing resources of a shared pool of configurable computing resources
09/15/16Cross architecture virtual machine migration
09/15/16Scalable parallel messaging process
09/15/16Executing a kernel device driver as a user space process
09/15/16Statistical design with importance sampling reuse
09/15/16Data lifecycle management
09/15/16Preventing cascade failures in computer systems
09/15/16String dataflow error detection
09/15/16Trace capture of successfully completed transactions for trace debugging of failed transactions
09/15/16Temporary pipeline marking for processor error workarounds
09/15/16Data placement for loss protection in a storage system
09/15/16Battery charge measurement algorithm management
09/15/16Resilient programming frameworks for handling failures in parallel programs
09/15/16Resilient programming frameworks for handling failures in parallel programs
09/15/16Using duplicated data to enhance data security in raid environments
09/15/16Temporary pipeline marking for processor error workarounds
09/15/16Optimizing disaster recovery systems during takeover operations
09/15/16Validating connection, structural characteristics and positioning of cable connectors
09/15/16System and method for using development objectives to guide implementation of source code
09/15/16Detecting uninitialized memory references
09/15/16Program subset execution and debug
09/15/16Generation of automated unit tests for a controller layer system and method
09/15/16Dynamic address translation with fetch protection in an emulated environment
09/15/16Grouping tracks for destaging
09/15/16Privilege based memory pinning mechanism
09/15/16Interconnect channel management
09/15/16Coupling parallel event-driven computation with serial computation
09/15/16Controller and method for migrating rdma memory mappings of a virtual machine
09/15/16Controller and method for migrating rdma memory mappings of a virtual machine
09/15/16Creating xml data from a database
09/15/16Entity metadata attached to multi-media surface forms
09/15/16Performance detection and enhancement of machine translation
09/15/16Performance detection and enhancement of machine translation
09/15/16Grid based data mobility
09/15/16Providing answers to questions having both rankable and probabilistic components
09/15/16File transfer system using file backup times
09/15/16File transfer system using file backup times
09/15/16Answering natural language table queries through semantic table representation
09/15/16Mechanism for communication in a distributed database
09/15/16Explain tool for optimizing sparql queries
09/15/16Explain tool for optimizing sparql queries
09/15/16Database query language gateway
09/15/16Reducing redundant operations in a streaming environment
09/15/16System for retrieving, visualizing and editing semantic annotations
09/15/16Analyzing a data set utilizing inflection points
09/15/16Plural architecture master data management with supplemental attributes
09/15/16Managing replication configuration availability
09/15/16Creating xml data from a database
09/15/16Reducing redundant operations in a streaming environment
09/15/16Dense subgraph identification
09/15/16Circuit placement with electro-migration mitigation
09/15/16Circuit placement with electro-migration mitigation
09/15/16Detecting outlier prescription behavior using graphical models with latent variables
09/15/16Securely booting a computer from a user trusted device
09/15/16Securely booting a computer from a user trusted device
09/15/16Governed routing of enterprise data in hybrid mobile applications
09/15/16Shared data encryption and confidentiality
09/15/16Systems and methods for false alarm reduction during event detection
09/15/16Coupling parallel event-driven computation with serial computation
09/15/16Neuromorphic synapses
09/15/16Neuromorphic synapses
09/15/16Enhancement of massive data ingestion by similarity linkage of documents
09/15/16Enhancement of massive data ingestion by similarity linkage of documents
09/15/16Inferring a context-sensitive business rule from a legacy business system
09/15/16Disruption forecasting in complex schedules
09/15/16Disruption forecasting in complex schedules
09/15/16Providing answers to questions having both rankable and probabilistic components
09/15/16Creating sustainable innovation platforms based on service first and service now approach
09/15/16Creating sustainable innovation platforms based on service first and service now approach
09/15/16Compensating for reduced availability of a disrupted project resource
09/15/16Early reservation of managed inventory
09/15/16Early reservation of managed inventory
09/15/16Mapping transactions between the real world and a virtual world
09/15/16Electronic data modelling tool
09/15/16Creative color design
09/15/16Creative color design
09/15/16Simplified lighting compositing
09/15/16Distributed parking space detection, characterization, advertisement, and enforcement
09/15/16Method and system for order-free spoken term detection
09/15/16Method and system for order-free spoken term detection
09/15/16Speech effectiveness rating
09/15/16Mismatch and noise insensitive stt mram
09/15/16Piezoelectronic switch device for rf applications
09/15/16Double aspect ratio trapping
09/15/16Selective epitaxy using epitaxy-prevention layers
09/15/16Air gap contact formation for reducing parasitic capacitance
09/15/16Ultrathin multilayer metal alloy liner for nano cu interconnects
09/15/16Diffusion barrier layer formation
09/15/16Structure and method of latchup robustness with placement of through wafer via within cmos circuitry
09/15/16Structure for integration of an iii-v compound semiconductor on soi
09/15/16Low resistance contact for semiconductor devices
09/15/16Double aspect ratio trapping
09/15/16Asymmetric high-k dielectric for reducing gate induced drain leakage
09/15/16Self-aligned source and drain regions for semiconductor devices
09/15/16Single crystalline cztsse photovoltaic device
09/15/16Single crystalline cztsse photovoltaic device
09/15/16Embedded gallium-nitride in silicon
09/15/16High-speed latch circuits by selective use of large gate pitch
09/15/16Clock signal controller
09/15/16Realizing coarse wavelength-division multiplexing using standard multimode optical fibers
09/15/16Realizing coarse wavelength-division multiplexing using standard multimode optical fibers
09/15/16Resiliency in ethernet fabric architectures by event notification
09/15/16Creating new cloud resource instruction set architecture
09/15/16Creating new cloud resource instruction set architecture
09/15/16Managing servers with quality of service assurances
09/15/16Symmetric coherent request/response policy enforcement
09/15/16Network node on-demand link resources
09/15/16Deploying applications in a networked computing environment
09/15/16Sampling of device states for mobile software applications
09/15/16Dynamic network monitoring
09/15/16Dynamic network monitoring
09/15/16Dual purpose on-chip buffer memory for low latency switching
09/15/16Managing application, middleware, and virtual mechanism density in a cloud
09/15/16System, method and program product for scheduling interventions on allocated resources with minimized client impacts
09/15/16Policy driven storage hardware allocation
09/15/16Transmitting multi-destination packets in overlay networks
09/15/16Allow hidden and silent observers in a group conversation
09/15/16Mediating messages with negative sentiments in a social network
09/15/16Recommending hashtags to be used in composed message to increase propagation speed and enhance desired sentiment of composed message
09/15/16Monitoring of subscriber message processing in a publish/subscribe messaging environment
09/15/16Reissue of cryptographic credentials
09/15/16Transaction authorization using a vocalized challenge
09/15/16Anonymously sharing resources based on social network user data
09/15/16Deploying a security appliance system in a high availability environment without extra network burden
09/15/16Deploying a security appliance system in a high availability environment without extra network burden
09/15/16Allow hidden and silent observers in a group conversation
09/15/16System and method for providing more appropriate question/answer responses based upon profiles
09/15/16Web-browsing recommendations based on aggregated path data
09/15/16Gps suggestions based on social points of interest (poi) metadata
09/15/16Scalable parallel messaging process
09/15/16Providing agentless application performance monitoring (apm) to tenant applications by leveraging software-defined networking (sdn)
09/15/16Gps suggestions based on social points of interest (poi) metadata
09/15/16Identity management in a networked computing environment
09/15/16Rdma-optimized high-performance distributed cache
09/15/16Zero copy data transfers without modifying host side protocol stack parameters
09/15/16Usage of software programs on mobile computing devices
09/15/16Conference call alerts
09/15/16Using graphical text analysis to facilitate communication between customers and customer service representatives
09/15/16Using graphical text analysis to facilitate communication between customers and customer service representatives
09/15/16Service request routing using passive skill certification
09/15/16Conference call alerts
09/15/16Usage of software programs on mobile computing devices
09/15/16Wireless cross-connect switch
09/15/16Controlling rigidity of flexible displays
09/15/16Manufacturing a product using a soldering process
09/15/16Minimizing leakage in liquid cooled electronic equipment
09/15/16Minimizing leakage in liquid cooled electronic equipment
09/08/16Neutralizing propagation of malicious information
09/08/16Analyzer for behavioral analysis and parameterization of neural stimulation
09/08/16Analyzer for behavioral analysis and parameterization of neural stimulation
09/08/16Automated health product dispensary library
09/08/16Micro-electro-mechanical system (mems) and related actuator bumps, methods of manufacture and design structures
09/08/16Micro-electro-mechanical system (mems) and related actuator bumps, methods of manufacture and design structures
09/08/16Antimicrobial cationic polycarbonates
09/08/16Bioderived based plasticizers
09/08/16Bioderived based plasticizers
09/08/16Resilient deformable air valve
09/08/16Anomaly detection method, program, and system
09/08/16Anomaly detection method, program, and system
09/08/16Intelligent route navigation
09/08/16Providing online mapping with user selected preferences
09/08/16Optimization of integrated circuit reliability
09/08/16Externally latching drive tray and drive removal mechanism
09/08/16Preemptive trouble shooting using dialog manager
09/08/16Configure storage class memory command
09/08/16Frame choosing during storage constraint condition
09/08/16Dynamic feedback-based throughput control for black-box storage systems
09/08/16Virtual tape storage using inter-partition logical volume copies
09/08/16Incremental replication of a source data set
09/08/16Method, apparatus or software for transferring a storage replication system between storage systems
09/08/16Frame choosing during storage constraint condition
09/08/16Filtering information within augmented reality overlays
09/08/16System and method for serving multiple data objects and formatting functions in a single request
09/08/16Software patch management incorporating sentiment analysis
09/08/16Software patch management incorporating sentiment analysis
09/08/16Confidence-driven selective predication of processor instructions
09/08/16Catalog based discovery of virtual machine appliances
09/08/16Optimizing runtime performance of an application workload by minimizing network input/output communications between virtual machines on different clouds in a hybrid cloud topology during cloud bursting
09/08/16Automatic task execution on mobile devices
09/08/16Collaborative collection of diagnostics data of software programs
09/08/16Technology for stall detection
09/08/16Generating test data record set populations
09/08/16Breakpoint prediction
09/08/16Breakpoint prediction
09/08/16Targeted multi-tiered software stack serviceability
09/08/16Targeted multi-tiered software stack serviceability
09/08/16Collaborative collection of diagnostics data of software programs
09/08/16Preemptive trouble shooting using dialog manager
09/08/16Test coverage analysis
09/08/16Dictionary based social media stream filtering
09/08/16Dictionary based social media stream filtering
09/08/16Grid based data mobility
09/08/16Ensuring a desired distribution of content in a multimedia document for different demographic groups utilizing demographic information
09/08/16Handling information source ingestion in a question answering system
09/08/16Distributed version control of orchestration templates
09/08/16Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
09/08/16Shared scan output in incremental data analysis systems
09/08/16Parallelized hybrid sparse matrix representations for performing personalized content ranking
09/08/16Data comparison and analysis based on data analysis reporting
09/08/16Reporting and summarizing metrics in sparse relationships on an oltp database
09/08/16Reporting and summarizing metrics in sparse relationships on an oltp database
09/08/16Query disambiguation in a question-answering environment
09/08/16Consolidating and formatting search results
09/08/16Query disambiguation in a question-answering environment
09/08/16Lie vault
09/08/16Embedded integrated component governance policy
09/08/16Ensuring a desired distribution of images in a multimedia document utilizing facial signatures
09/08/16Ensuring a desired distribution of images in a multimedia document utilizing facial signatures
09/08/16Rapid cognitive mobile application review
09/08/16Techniques for rotating language preferred orientation on a mobile device
09/08/16Interactive text recognition by a head-mounted device
09/08/16Time-division multiplexed neurosynaptic module with implicit memory addressing for implementing a universal substrate of adaptation
09/08/16Cardinality estimation using artificial neural networks
09/08/16Transductive lasso for high-dimensional data regression problems
09/08/16Data comparison and analysis based on data analysis reporting
09/08/16Product identification via image analysis
09/08/16Determining compatibility of multiple specifications
09/08/16Determining compatibility of multiple specifications
09/08/16Ensuring a desired distribution of content in a multimedia document for different demographic groups utilizing demographic information
09/08/16Rapid cognitive mobile application review
09/08/16Electronic communication devices co-locating subject-related persons
09/08/16Rapid service orchestration and management
09/08/16Obtaining software asset insight by analyzing collected metrics using analytic services
09/08/16Techniques for rotating language preferred orientation on a mobile device
09/08/16Filtering information within augmented reality overlays
09/08/16Physical access request authorization
09/08/16Wearer role-based visually modifiable garment
09/08/16Cognitive bias determination and modeling
09/08/16Measurement and correction of magnetic writer offset error
09/08/16Laminating magnetic cores for on-chip magnetic devices
09/08/16Storage device with 2d configuration of phase change memory integrated circuits
09/08/16Buffered automated flash controller connected directly to processor memory bus
09/08/16Asymmetric high-k dielectric for reducing gate induced drain leakage
09/08/16Asymmetric high-k dielectric for reducing gate induced drain leakage
09/08/16Type iii-v and type iv semiconductor device formation
09/08/16Interfacial alloy layer for improving electromigration (em) resistance in solder joints
09/08/16Magnetic multilayer structure
09/08/16Semiconductor device with low band-to-band tunneling
09/08/16Semiconductor devices having fins, and methods of forming semiconductor devices having fins
09/08/16Heterojunction tunnel field effect transistor fabrication using limited lithography steps
09/08/16Method and structure to reduce parasitic capacitance in raised source/drain silicon-on-insulator devices
09/08/16Gate contact with vertical isolation from source-drain
09/08/16Integrated photodetector waveguide structure with alignment tolerance
09/08/16Photovoltaic devices with an interfacial band-gap modifying structure and methods for forming the same
09/08/16Magnetic tunnel junction patterning using low atomic weight ion sputtering
09/08/16Magnetic tunnel junction patterning using low atomic weight ion sputtering
09/08/16Method to protect sensitive devices from electrostatic discharge damage
09/08/16Smart battery charging to improve the lifespan of batteries
09/08/16Smart battery charging to improve the lifespan of batteries
09/08/16Channel ownership in a publish-subscribe system
09/08/16Dynamic http load balancing
09/08/16Client-side fault tolerance in a publish-subscribe system
09/08/16Load balancing for a virtual networking system
09/08/16Building a multi-tenant portal application
09/08/16Method and system for managing resource capability in a service-centric system
09/08/16Moderating online discussion using graphical text analysis
09/08/16Moderating online discussion using graphical text analysis
09/08/16Automated document lifecycle management
09/08/16Protecting data owned by an operating system in a multi-operating system mobile environment
09/08/16Content filtering for personal productivity applications
09/08/16Identifying malicious web infrastructures
09/08/16Computer implemented techniques for detecting, investigating and remediating security violations to it infrastructure
09/08/16Identifying malicious web infrastructures
09/08/16Selective copying of track data through peer-to-peer remote copy
09/08/16Evaluation of composition rules used for generation of digital content
09/08/16Network-aware structured content downloads
09/08/16Migrating legacy applications to a multi-tenant computing environment
09/08/16Building a multi-tenant portal application
09/08/16Migrating legacy applications to a multi-tenant computing environment
09/08/16Filtering video for video telephony and video conferencing
09/08/16An automatic system and method for conversion of smart phone applications to basic phone applications
09/08/16Public service awareness of crowd movement and concentration
09/08/16Enhanced power conservation for mobile devices
09/08/16Electronic package with heat transfer element(s)
09/08/16Electronic package with heat transfer element(s)
09/08/16Active control for two-phase cooling
09/01/16System and method of charging a vehicle using a dynamic power grid, and system and method of managing power consumption in the vehicle
09/01/16System and method of charging a vehicle using a dynamic power grid, and system and method of managing power consumption in the vehicle
09/01/16Poly(ether sulfone)s and poly(ether amide sulfone)s and methods of their preparation
09/01/16Flame-retardant polymers derived from polyols and polyacids
09/01/16Adsorption heat exchanger devices
09/01/16Calibrating thermal behavior of electronics
09/01/16Systems and methods to test and/or recover magnetic sensors with esd or other damage
09/01/16Complementary metal oxide semiconductor device with iii-v optical interconnect having iii-v epitaxially formed material
09/01/16Alignment of single-mode polymer waveguide (pwg) array and silicon waveguide (siwg) array of providing adiabatic coupling
09/01/16Three dimensional self-alignment of flip chip assembly using solder surface tension during solder reflow
09/01/16Photonic circuit device with on-chip optical gain measurement structures
09/01/16Processor management via thread status
09/01/16Controlling electronic equipment with a touching-type signal input device
09/01/16I/o performance in resilient arrays of computer storage devices
09/01/16Intelligent rolling upgrade for data storage systems
09/01/16Tuning utilization and heap memory size for real-time garbage collection
09/01/16Management of destage tasks with large number of ranks
09/01/16Migration of newly allocated data to a storage tier
09/01/16Splitable and scalable normalizer for vector data
09/01/16Software refactoring
09/01/16Using cloud patterns for installation on unmanaged physical machines and appliances
09/01/16Integrated development environment-based repository searching in a networked computing environment
09/01/16Forming instruction groups based on decode time instruction optimization
09/01/16Universal history buffer to support multiple register types
09/01/16History buffer with hybrid entry support for multiple-field registers
09/01/16History buffer for multiple-field registers
09/01/16Forming instruction groups based on decode time instruction optimization
09/01/16Api prioritization and detection
09/01/16Ascertaining configuration of a virtual adapter in a computing environment
09/01/16Policy based virtual resource allocation and allocation adjustment
09/01/16Policy based virtual resource allocation and allocation adjustment
09/01/16Ascertaining configuration of a virtual adapter in a computing environment
09/01/16Categorizing memory pages based on page residences
09/01/16Resource-based job scheduling
09/01/16Apparatus and method for serializing process instance access to information stored redundantly in at least two datastores
09/01/16Smart cloud workload balancer
09/01/16Efficient parallel processing of a network with conflict constraints between nodes
09/01/16Data center operation
09/01/16Rebuilding encoded data slices in a dispersed storage network
09/01/16System, method and program product for backing up data
09/01/16Using unused portion of the storage space of physical storage devices configured as a raid
09/01/16Predictive approach to environment provisioning
09/01/16Singleton cache management protocol for hierarchical virtualized storage systems
09/01/16Intelligent bandwidth shifting mechanism
09/01/16Memory data security
09/01/16Memory data security
09/01/16Dynamic highlighting of repetitions in electronic documents
09/01/16Inserting links that aid action completion
09/01/16Automatic question generation and answering based on monitored messaging sessions
09/01/16Grid based data mobility
09/01/16Metadata-driven workflows and integration with genomic data processing systems and techniques
09/01/16Predictive model search by communicating comparative strength
09/01/16Predictive model search by communicating comparative strength
09/01/16Determination of a service description most closely matching a specified service name
09/01/16Index record-level locking for record-oriented file systems
09/01/16Accessing data entities
09/01/16Transaction processing system, method and program
09/01/16Database query execution tracing and data generation for diagnosing execution issues
09/01/16Database query execution tracing and data generation for diagnosing execution issues
09/01/16On-the-fly encoding method for efficient grouping and aggregation
09/01/16Recommendation engine using inferred deep similarities for works of literature
09/01/16Automatically synchronizing production data of a source system and a target system
09/01/16Recommendation engine using inferred deep similarities for works of literature
09/01/16Integration of web information architecture taxonomy and web metrics taxonomy
09/01/16Support for secure objects in a computer system
09/01/16Authentication mechanism
09/01/16Conversation branching for more efficient resolution
09/01/16Geometry-directed active question selection for question answering systems
09/01/16Efficient tail calculation to exploit data correlation
09/01/16Efficient tail calculation to exploit data correlation
09/01/16Display of graphical representations of legends in virtualized data formats
09/01/16Item movement tracking with three-dimensional (3d) proximity exclusions
09/01/16Aligned shingled writing for magnetic recording media and media having shingle edge positioned tracks
09/01/16Tape recording head having non-parallel gaps and dissimilar transducer pitches
09/01/16Reducing total seek time for determining an access sequence of data stored on a tape medium
09/01/16Low temperature fabrication of lateral thin film varistor
09/01/16Selective dopant junction for a group iii-v semiconductor device
09/01/16Finfet having controlled dielectric region height
09/01/16Reduced current leakage semiconductor device
09/01/16Methods of modulating strain in pfet and nfet finfet semiconductor devices
09/01/16Forming a cmos with dual strained channels
09/01/16Integrated circuit barrierless microfluidic channel
09/01/16Semiconductor device security
09/01/16Semiconductor device security
09/01/16Iii-v finfet cmos with iii-v and germanium-containing channel closely spaced
09/01/16Low temperature fabrication of lateral thin film varistor
09/01/16Method of formation of germanium nanowires on bulk substrates
09/01/16Reduced current leakage semiconductor device
09/01/16Ion conducting hybrid membranes
09/01/16Three-d power converter in three distinct strata
09/01/16Method and system using vibration signatures for pairing master and slave computing devices
09/01/16Tagging virtual overlay packets in a virtual networking system
09/01/16Dynamically determining packet sampling rates
09/01/16Selectively refreshing address registration information
09/01/16Adaptive software defined networking controller
09/01/16Determining virtual adapter access controls in a computing environment
09/01/16Context-dependent message management
09/01/16Selectively refreshing address registration information
09/01/16Communications over multiple protocol interfaces in a computing environment
09/01/16Packet processing in a multi-tenant software defined network (sdn)
09/01/16Determining virtual adapter access controls in a computing environment
09/01/16Efficient parallel processing of a network with conflict constraints between nodes
09/01/16Storing data in a dispersed storage network
09/01/16Context-dependent message management
09/01/16Interactive surveillance overlay
09/01/16Interactive surveillance overlay
09/01/16Electronic module power supply
09/01/16Reduced friction retention of a data storage cartridge within a storage cell
09/01/16Reduced friction retention of a data storage cartridge within a storage cell
08/25/16Identifying a change in a home environment
08/25/16Microfluidic probe head for processing a sequence of liquid volumes separated by spacers
08/25/16Planar cavity mems and related structures, methods of manufacture and design structures
08/25/16Block copolymers with surface-active junction groups, compositions and processes thereof
08/25/16Hybrid topographical and chemical pre-patterns for directed self-assembly of block copolymers
08/25/16Optical modules for wavelength multiplexing
08/25/16Via for electrical contact passing through layers of optical waveguide in multilayer structure including electrical substrate and laminated layers of optical waveguide
08/25/16Interfacing via heads-up display using eye contact
08/25/16Supercomputer using wafer scale integration
08/25/16Workload routing for managing energy in a data center
08/25/16Predictive electrical appliance device power management mode based on presence detection of mobile device
08/25/16Interfacing via heads-up display using eye contact
08/25/16Integrated mobile service companion
08/25/16Navigation through historical stored interactions associated with a multi-user view
08/25/16Persuasive portlets
08/25/16Page compression strategy for improved page out process
08/25/16Minimizing delay periods when accessing mirrored disks
08/25/16Optimized copy algorithm selection
08/25/16Efficient register preservation on processors
08/25/16Raid array systems and operations using mapping information
08/25/16Handling failure of a command to add a record to a log
08/25/16Using hardware transactional memory for implementation of queue operations
08/25/16Dynamic extensibility of application programming interfaces
08/25/16Techniques for providing environmental impact information associated with code
08/25/16Systems and methods for selectively enabling and disabling hardware features
08/25/16Dynamic reconfiguration of queue pairs
08/25/16Per tenant initialization check removal
08/25/16Per tenant initialization check removal
08/25/16Hint instruction for managing transactional aborts in transactional memory computing environments
08/25/16Dynamic recommendation framework for information technology management
08/25/16Hint instruction for managing transactional aborts in transactional memory computing environments
08/25/16Acquiring diagnostic data selectively
08/25/16Automatic troubleshooting
08/25/16Preemptive relocation of failing data
08/25/16Raid array systems and operations using mapping information
08/25/16File deduplication in a file system
08/25/16Accelerated recovery after a data disaster
08/25/16Accelerated recovery after a data disaster
08/25/16Fault tolerant distributed computation
08/25/16Acquiring diagnostic data selectively
08/25/16Dynamically adjusting power disturbance hold up times
08/25/16Methods for selectively enabling and disabling hardware features
08/25/16Hardware-based edge profiling
08/25/16Identifying the lines of code that caused the error as identified in the stack trace in a source code version that generated the stack trace that does not reside on the user's computing device
08/25/16Smart programming playgrounds
08/25/16Data fabrication based on test requirements
08/25/16Single-thread cache miss rate estimation
08/25/16Single-thread cache miss rate estimation
08/25/16Prefetching data
08/25/16Store forwarding cache
08/25/16Input/output port rotation in a storage area network device
08/25/16Managing product configuration
08/25/16Social networking response management system
08/25/16Facilitating information extraction via semantic abstraction
08/25/16Adjusting ranges of directed graph ontologies across multiple dimensions
08/25/16Customizable and low-latency interactive computer-aided translation
08/25/16Systems and methods for network transmission of medical images
08/25/16Device data personalization
08/25/16Policy-based, multi-scheme data reduction for computer memory
08/25/16Suggesting a message to user to post on a social network based on prior posts directed to same topic in a different tense
08/25/16Query predicate evaluation and computation for hierarchically compressed data
08/25/16Query predicate evaluation and computation for hierarchically compressed data
08/25/16Streamlining data deduplication
08/25/16System and method for machine information life cycle
08/25/16Data stream quality management for analytic environments
08/25/16Managing time series databases
08/25/16Managing data in storage according to a log structure
08/25/16Relaxing transaction serializability with statement-based data replication
08/25/16Method for en passant workload shift detection
08/25/16Method for en passant workload shift detection
08/25/16Algorithmic changing in a streaming environment
08/25/16Parallel transactional-statistics collection for improving operation of a dbms optimizer module
08/25/16Recommendation for an individual based on a mood of the individual
08/25/16Relaxing transaction serializability with statement-based data replication
08/25/16Zero-data loss recovery for active-active sites configurations
08/25/16Zero-data loss recovery for active-active sites configurations
08/25/16Providing answers to questions using logical synthesis of candidate answers
08/25/16Providing answers to questions using logical synthesis of candidate answers
08/25/16Local context search results improvements
08/25/16Mitigating subjectively disturbing content through the use of context-based data gravity wells
08/25/16System and method for weighting manageable patient attributes during criteria evaluations for treatment
08/25/16System and method for weighting manageable patient attributes during criteria evaluations for treatment
08/25/16Programming code execution management
08/25/16Inter-virtual machine communication
08/25/16Unmasking of confidential content
08/25/16Code analysis for providing data privacy in etl systems
08/25/16Fine-grained user control over usages of sensitive system resources having private data with applications in privacy enforcement
08/25/16Fine-grained user control over usages of sensitive system resources having private data with applications in privacy enforcement
08/25/16Serial number based currency-owner identification
08/25/16System and method for contexually interpreting image sequences
08/25/16Mapping of algorithms to neurosynaptic hardware
08/25/16Reconfigurable and customizable general-purpose circuits for neural networks
08/25/16Relevance-weighted forecasting based on time-series decomposition
08/25/16Using cohorts to infer attributes for an input case in a question answering system
08/25/16Using cohorts to infer attributes for an input case in a question answering system
08/25/16Recommendation for an individual based on a mood of the individual
08/25/16Extracting complex entities and relationships from unstructured data
08/25/16Confidence weighting of complex relationships in unstructured data
08/25/16Dynamic travel expense optimization
08/25/16Intelligent service management and process control using policy-based automation and predefined task templates
08/25/16Verifying exposure of user to advertising
08/25/16Systems and methods for gift management
08/25/16Interpreting texture in support of mobile commerce and mobility
08/25/16Identifying a change in a home environment
08/25/16Quality of experience for communication sessions
08/25/16Quality of experience for communication sessions
08/25/16Variable scoping capability for physical tape layout diagnostic structure of tape storage device
08/25/16Epitaxial silicon germanium fin formation using sacrificial silicon fin templates
08/25/16Dual fin integration for electron and hole mobility enhancement
08/25/16Interconnect structure having large self-aligned vias
08/25/16Multiple threshold voltage trigate devices using 3d condensation
08/25/16Registration mark formation during sidewall image transfer process
08/25/16On-chip semiconductor device having enhanced variability
08/25/16Method of co-integration of strained silicon and strained germanium in semiconductor devices including fin structures
08/25/16Preventing buried oxide gouging during planar and finfet processing on soi
08/25/16Epitaxial silicon germanium fin formation using sacrificial silicon fin templates
08/25/16Non-uniform gate dielectric for u-shape mosfet
08/25/16Forming strained fins of different materials on a substrate
08/25/16Field-effect transistor with aggressively strained fins
08/25/16Silicon photonics integration method and structure
08/25/16Self-limited crack etch to prevent device shorting
08/25/16Spin torque transfer mram device formed on silicon stud grown by selective epitaxy
08/25/16Fabric multipathing based on dynamic latency-based calculations
08/25/16Smart dumping of network switch forwarding database
08/25/16Instrumentation and monitoring of service level agreement (sla) and service policy enforcement
08/25/16Non-disruptive integrated network infrastructure testing
08/25/16Algorithmic changing in a streaming environment
08/25/16Credit-based flow control in lossless ethernet networks
08/25/16Modular cloud computing system
08/25/16Admission control based on the end-to-end availability
08/25/16Overlay network capable of supporting storage area network (san) traffic
08/25/16Facilitating access to references in communications
08/25/16Dynamic analytics controlled information dissemination in social media
08/25/16Blinder avoidance in social network interactions
08/25/16Estimation of information diffusion route on computer mediated communication network
08/25/16Social networking response management system
08/25/16Code analysis for providing data privacy in etl systems
08/25/16System and method for sharing access to a service within a home network
08/25/16Data communication in a clustered data processing environment
08/25/16Captcha challenge incorporating obfuscated characters
08/25/16Policy access control lists attached to resources
08/25/16Security management in a networked computing environment
08/25/16Scalable self-healing architecture for client-server operations in transient connectivity conditions
08/25/16Metadata sharing to decrease file transfer time
08/25/16Populating a new community for a social network
08/25/16Techniques for mobility-aware dynamic service placement in mobile clouds
08/25/16Data communication in a clustered data processing environment
08/25/16Populating a user network for a focus user
08/25/16Monitoring voice over internet protocol (voip) quality during an ongoing call
08/25/16Coding scheme for identifying spatial locations of events within video image data
08/25/16Load balancing traffic in a mpls network
08/25/16Printed circuit board edge connector
08/25/16Identifying a digital data handling unit
08/18/16Thin film composite forward osmosis membranes with performance enhancing layers
08/18/16Anti-fouling coatings with star polymers for filtration membranes
08/18/16Microfluidic probe head for providing a sequence of separate liquid volumes separated by spacers
08/18/16Fluoro-alcohol additives for orientation control of block copolymers
08/18/16Flame retardant block copolymers from renewable feeds
08/18/16Flame retardant block copolymers from renewable feeds
08/18/16Anneal techniques for chalcogenide semiconductors
08/18/16Navigating to comfortable and safe parking
08/18/16Navigating to comfortable and safe parking
08/18/16Integration of historical user experience analytics into route recommendations
08/18/16Nanopore sensor for detecting molecular interactions
08/18/16Estimating solar array power generation
08/18/16Estimating solar array power generation
08/18/16Systems and methods to prevent incorporation of a used integrated circuit chip into a product
08/18/16Collecting diagnostic data from chips
08/18/16Structure and method for fixing phase effects on euv mask
08/18/16Method for monitoring focus in euv lithography
08/18/16Disaggregated mobile client
08/18/16Delaying execution in a processor to increase power savings
08/18/16Delaying execution in a processor to increase power savings
08/18/16One-handed operation of mobile electronic devices
08/18/16System and method for calculating metrics
08/18/16System and method for calculating metrics
08/18/16Determining causes of external fragmentation of memory
08/18/16Determining causes of external fragmentation of memory
08/18/16Combining virtual mapping metadata and physical space mapping metadata
08/18/16Learning intended user actions
08/18/16Learning intended user actions
08/18/16Executing perform floating point operation instructions
08/18/16Supporting software application developers to iteratively refine requirements for web application programing interfaces
08/18/16Method and apparatus for enabling agile development of services in cloud computing and traditional environments
08/18/16Sparse object instantiation
08/18/16Device driver aggregation in operating system deployment
08/18/16Deploying an application in a cloud computing environment
08/18/16Deploying an application in a cloud computing environment
08/18/16Deploying an application in a cloud computing environment
08/18/16Speculative branch handling for transaction abort
08/18/16Branch target buffer column predictor
08/18/16Dynamic resource allocation across dispatch pipes
08/18/16Load queue entry reuse for operand store compare history table update
08/18/16Load queue entry reuse for operand store compare history table update
08/18/16Branch target buffer column predictor
08/18/16Speculative branch handling for transaction abort
08/18/16Management of tracking queues used in out-of-order processing within computing environments
08/18/16Personalizing error messages based on user learning styles
08/18/16Management of virtual machine migration in an operating environment
08/18/16Techniques for hybrid computer thread creation and management
08/18/16Determining an ordering to use to open and close programs that call other programs
08/18/16Dynamic correlated operation management for a distributed computing system
08/18/16System and method of providing inter-application communications
08/18/16All-to-all message exchange in parallel computing systems
08/18/16Extensible data interface for shared service module
08/18/16Persistent command parameter table for pre-silicon device testing
08/18/16Dynamic cache row fail accumulation due to catastrophic failure
08/18/16Dynamic array masking
08/18/16Dynamic cache row fail accumulation due to catastrophic failure
08/18/16Responding to a maintenance free storage container security threat
08/18/16Correcting overlapping data sets in a volume
08/18/16Disk preservation and failure prevention in a raid array
08/18/16Preserving management services with distributed metadata through the disaster recovery life cycle
08/18/16Faulty core recovery mechanisms for a three-dimensional network on a processor array
08/18/16Preserving management services with distributed metadata through the disaster recovery life cycle
08/18/16Embedding and executing trace functions in code to gather trace data
08/18/16Identity propagation through application layers using contextual mapping and planted values
08/18/16Accelerating multiversion concurrency control using hardware transactional memory
08/18/16Parallel garbage collection implemented in hardware
08/18/16Early shared resource release in symmetric multiprocessing computer systems
08/18/16Memory nest efficiency with cache demand generation
08/18/16Memory nest efficiency with cache demand generation
08/18/16Hierarchical pre-fetch pipelining in a hybrid memory server
08/18/16Hierarchical pre-fetch pipelining in a hybrid memory server
08/18/16Set selection of a set-associative storage container
08/18/16Set selection of a set-associative storage container
08/18/16Position-based replacement policy for address synonym management in shared caches
08/18/16Dynamic synchronous to asynchronous frequency transitions in high-performance symmetric multiprocessing
08/18/16Efficient calibration of a low power parallel data communications channel
08/18/16Adaptive parsing of sparse xml data
08/18/16Persisting the state of visual control elements in uniform resource locator (url)-generated web pages
08/18/16Identifying word-senses based on linguistic variations
08/18/16Identifying word-senses based on linguistic variations
08/18/16Storage and recovery of digital data based on social network
08/18/16Electronic meeting question management
08/18/16Database identifier generation in transaction processing systems
08/18/16Governing information
08/18/16Database identifier generation in transaction processing systems
08/18/16Electronic meeting question management
08/18/16Method for processing a database query
08/18/16Optimized query ordering for file path indexing in a content repository
08/18/16Supporting software application developers to iteratively refine requirements for web application programming interfaces
08/18/16Method for processing a database query
08/18/16Dynamic inference graph
08/18/16Behavioral model based on short and long range event correlations in system traces
08/18/16Behavioral model based on short and long range event correlations in system traces
08/18/16Secure authentication mechanism using quick response codes
08/18/16Detecting a cryogenic attack on a memory device with embedded error correction
08/18/16Preventing re-patching by malware on a computer
08/18/16Content based hardware security module assignment to virtual machines
08/18/16Contemporaneous gesture and keyboard entry authentication
08/18/16Question answering with time-based weighting
08/18/16Intelligent user interaction experience for mobile computing devices
08/18/16Generating deportment and comportment cohorts
08/18/16Leveraging an external ontology for graph expansion in inference systems
08/18/16Geographical condition prediction
08/18/16Intelligent user interaction experience for mobile computing devices
08/18/16Autonomous delivery of items
08/18/16Autonomous delivery of items
08/18/16Storage and recovery of digital data based on social network
08/18/16System and method to support identity theft protection as part of a distributed service oriented ecosystem
08/18/16System and method for enabling multiple-state avatars
08/18/16Iterative deepening knowledge discovery using closure-based question answering
08/18/16Dynamic content alignment in touch screen device
08/18/16Moving cartridge between library strings
08/18/16Automated data storage library with target of opportunity recognition
08/18/16Persistent command parameter table for pre-silicon device testing
08/18/16System and method for differential etching
08/18/16Reduced volume interconnect for three-dimensional chip stack
08/18/16Planarity-tolerant reworkable interconnect with integrated testing
08/18/16Cmos nfet and pfet comparable spacer width
08/18/16Junction interlayer dielectric for reducing leakage current in semiconductor devices
08/18/16Iii-v semiconductor devices with selective oxidation
08/18/16Doped zinc oxide and n- doping to reduce junction leakage
08/18/16Solar cell with reduced absorber thickness and reduced back surface recombination
08/18/16Anneal techniques for chalcogenide semiconductors
08/18/16Latency reduced error correction scheme with error indication function for burst error correction codes
08/18/16Node interconnect architecture to implement high-performance supercomputer
08/18/16Content based hardware security module assignment to virtual machines
08/18/16Automatic key management using enterprise user identity management
08/18/16Correlating computing network events
08/18/16Managing asset deployment for a shared pool of configurable computing resources
08/18/16Managing asset deployment for a shared pool of configurable computing resources
08/18/16Predicting and updating availability status of a user
08/18/16Point in time expression of emotion data gathered from a chat session
08/18/16Personal communication data management in multilingual mobile device
08/18/16Organizing social network messages based on temporal characteristics
08/18/16Personal communication data management in multilingual mobile device
08/18/16Traffic shape obfuscation when using an encrypted network connection
08/18/16Traffic shape obfuscation when using an encrypted network connection
08/18/16Selective password synchronization
08/18/16Automatic key management using enterprise user identity management
08/18/16Managing limited network access configuration
08/18/16Validation of a location resource based on recipient access
08/18/16Information sharing for third party applications in cellular telecommunication infrastructures
08/18/16Decoding of encrypted file
08/18/16Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
08/18/16Method and apparatus for controlling information in virtual world
08/18/16Enabling an on-premises resource to be exposed to a public cloud application securely and seamlessly
08/18/16Method and system of network transfer adaptive optimization in large-scale parallel computing system
08/18/16Deploying a portion of a streaming application to one or more virtual machines according to hardware type
08/18/16Protocol independent storage discovery and enablement
08/18/16Directory service discovery and/or learning
08/18/16Predicting and updating availability status of a user
08/18/16Device delegation of push notification distribution
08/18/16Hybrid approach for performance enhancing proxies
08/18/16Selectively providing content to users located within a virtual perimeter
08/18/16Method of disabling transmission and capture of visual content on a device to protect from inappropriate content
08/18/16Synchronization of multiple single lens camera devices
08/18/16Geo-fencing aware compute infrastructure
08/18/16Intermediated data entry in a shared message board through a mobile computing device
08/18/16Substrate containing low-dk-core glass fibers having low dielectric constant (dk) cores for use in printed circuit boards (pcbs), and method of making same
08/18/16Flexible coolant manifold - heat sink assembly
08/18/16Cooling system with integrated fill and drain pump
08/18/16Cooling system with integrated fill and drain pump
08/11/16Delegating control of a vehicle
08/11/16Cognitive displays
08/11/16Renewable self-healing capsule system
08/11/16Modified conformal coatings with decreased sulfur solubility
08/11/16Mobile cellular spectroscopy
08/11/16Devices for trapping and controlling microparticles with radiation
08/11/16Chip performance monitoring system and method
08/11/16Scanning probe nanolithography system and method
08/11/16Identifying home automation correlated events and creating portable recipes
08/11/16Calculating expected maximum cpu power available for use
08/11/16Automatic detection of user preferences for alternate user interface model
08/11/16Selectively pinning sections of displayed content
08/11/16Selectively pinning sections of displayed content
08/11/16Thin provisioning
08/11/16Management of extents for space efficient storage volumes by reusing previously allocated extents
08/11/16Systems and methods for transformation of logical data objects for storage
08/11/16Management of physical extents for space efficient storage volumes
08/11/16Migration of executing applications and associated stored data
08/11/16Information processing system, wireless communication apparatus, method and program
08/11/16Method and system for managing a storage network to reduce power consumption
08/11/16Sharing and executing sensitive logic semantics
08/11/16System level testing of multi-threading functionality
08/11/16Efficient and consistent para-virtual i/o system
08/11/16Multi-target deployment of virtual systems
08/11/16Automated virtual machine provisioning based on defect state
08/11/16Feedback analysis for virtual machines manager scheduling
08/11/16Mitigation of virtual machine security breaches
08/11/16Selecting a host for a virtual machine using a hardware multithreading parameter
08/11/16Virtual module-based ultra-lazy installation for modular systems
08/11/16Compare point detection in multi-threaded computing environments
08/11/16Seamless extension of local computing power
08/11/16Application-level dispatcher control of application-level pseudo threads and operating system threads
08/11/16Cycle-level thread alignment on multi-threaded processors
08/11/16Thread folding tool
08/11/16Detecting uninitialized memory references
08/11/16Eliminate corrupted portions of cache during runtime
08/11/16Reproducing data from obfuscated data retrieved from a dispersed storage network
08/11/16Method for automatically configuring backup client systems and backup server systems in a backup environment
08/11/16Preserving management services with self-contained metadata through the disaster recovery life cycle
08/11/16Eliminate corrupted portions of cache during runtime
08/11/16Compare point detection in multi-threaded computing environments
08/11/16System level testing of multi-threading functionality
08/11/16Detecting uninitialized memory references
08/11/16Software testing optimizer
08/11/16Sharing and executing sensitive logic semantics
08/11/16Managing a lock to a resource shared among a plurality of processors
08/11/16Store forwarding cache
08/11/16Designated cache data backup during system operation
08/11/16Store forwarding cache
08/11/16Efficient multi-threaded journal space reclamation
08/11/16Set buffer state instruction
08/11/16Interconnect circuits at three dimensional (3-d) bonding interfaces of a processor array
08/11/16Debugging document formatting system
08/11/16Debugging document formatting system
08/11/16Contraction aware parsing system for domain-specific languages
08/11/16Extracting and recommending business processes from evidence in natural language systems
08/11/16Determination of a service description most closely matching a specified service name
08/11/16Providing answers to questions using hypothesis pruning
08/11/16Intelligently categorizing data to delete specified amounts of data based on selected data characteristics
08/11/16Method for intelligently categorizing data to delete specified amounts of data based on selected data characteristics
08/11/16Managing filesystem inodes
08/11/16Method and system for database partition
08/11/16Management of a database system
08/11/16Dynamic system segmentation for service level agreements enforcement
08/11/16Aiding resolution of a transaction
08/11/16Method and system for database partition
08/11/16Optionally compressed output from command-line interface
08/11/16Efficient structured data exploration with a combination of bivariate metric and centrality measures
08/11/16Synchronized data changes
08/11/16Categorizing questions in a question answering system
08/11/16Generating usage report in a question answering system based on question categorization
08/11/16Identifying categories within textual data
08/11/16Efficient structured data exploration with a combination of bivariate metric and centrality measures
08/11/16Mining product aspects from opinion text
08/11/16Resource management in a presentation environment
08/11/16Intelligent governance controls based on real-time contexts
08/11/16Continuously blocking query result data for a remote query
08/11/16Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)
08/11/16Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)
08/11/16Software license and installation process management within an organization
08/11/16Stateful data geofencing
08/11/16Intelligent governance controls based on real-time contexts
08/11/16Mapping and obscuring digital representations of a number of user accounts on a social network map
08/11/16Scene understanding using a neurosynaptic system
08/11/16Scoring type coercion for question answering
08/11/16Passage justification scoring for question answering
08/11/16Passage justification scoring for question answering
08/11/16Scoring type coercion for question answering
08/11/16System and method for color paint selection and acquisition
08/11/16Identifying home automation correlated events and creating portable recipes
08/11/16Statistically and ontologically correlated analytics for business intelligence
08/11/16Using source data to predict and detect software deployment and shelfware
08/11/16Migrating prescriptive content
08/11/16Statistically and ontologically correlated analytics for business intelligence
08/11/16Using source data to predict and detect software deployment and shelfware
08/11/16Automatic ground truth generation for medical image collections
08/11/16System and method for color paint selection and acquisition
08/11/16Creating three dimensional models with acceleration data
08/11/16Safety equipment criteria verification
08/11/16Dynamically providing to a person feedback pertaining to utterances spoken or sung by the person
08/11/16Systems and methods for protecting a sensitive device from corrosion
08/11/16Method of forming magnetic recording head having protected reader sensors and near zero recession writer poles
08/11/16Dynamic character substitution for web conferencing based on sentiment
08/11/16Tunable negative bitline write assist and boost attenuation circuit
08/11/16Integrated circuits with middle of line capacitance reduction in self-aligned contact process flow and fabrication methods
08/11/16Methods of forming field effect transistors using a gate cut process following final gate formation
08/11/16Method and structure for enabling high aspect ratio sacrificial gates
08/11/16Floating body storage device employing a charge storage trench
08/11/16Interconnects based on subtractive etching of silver
08/11/16Silicon interposer sndwich structure for esd, emi, and emc shielding and protection
08/11/16Coaxial carbon nanotube capacitor for edram
08/11/16Cmos structure on ssoi wafer
08/11/16Dual isolation on ssoi wafer
08/11/16Cmos structure on ssoi wafer
08/11/16Dual isolation on ssoi wafer
08/11/16Group iii nitride integration with cmos technology
08/11/16Formation of strained fins in a finfet device
08/11/16Sloped finfet with methods of forming same
08/11/16Stacked planar double-gate lamellar field-effect transistor
08/11/16Stacked planar double-gate lamellar field-effect transistor
08/11/16Dielectric isolated fin with improved fin profile
08/11/16Stacked planar double-gate lamellar field-effect transistor
08/11/16High selectivity nitride removal process based on selective polymer deposition
08/11/16Method of preventing epitaxy creeping under the spacer
08/11/16Secondary optic for concentrating photovoltaic device
08/11/16Nanowires formed by employing solder nanodots
08/11/16Efficient context save/restore during hardware decompression of deflate encoded data
08/11/16Parallel testing of a controller area network bus cable
08/11/16Interoperability for distributed overlay virtual environment
08/11/16Executing data stream processing applications in dynamic network environments
08/11/16Determining connection feasibility and selection between different connection types
08/11/16Handling packet reordering at a network adapter
08/11/16Virtual discussion threads for activities in a trusted network
08/11/16Three-dimensional time series data
08/11/16Creating a dynamic aggregate group profile of users in an online collaboration session for providing tailored content delivery
08/11/16Mapping and obscuring digital representations of a number of user accounts on a social network map
08/11/16Resource management in a presentation environment
08/11/16System and method for software defined deployment of security appliances using policy templates
08/11/16Testing web applications for security vulnerabilities with metarequests
08/11/16System and method for software defined deployment of security appliances using policy templates
08/11/16Partial likes of social media content
08/11/16Load-balancing input/output requests in clustered storage systems
08/11/16Distributed server election with imperfect clock synchronization
08/11/16Assigning a data item to a storage location in a computing environment
08/11/16Method and apparatus for dynamic destination address control in a computer network
08/11/16Customizable serviceability mechanism
08/11/16Data transfer in a federated publish/subscribe system
08/11/16Smart cache for offline data availability
08/11/16Automating user's operations
08/11/16Natural gazes during online video conversations
08/11/16Smart hearing aid
08/11/16Smart hearing aid
08/11/16Byte caching in wireless communication networks
08/04/16Biodegradable organic radical-functionalized polycarbonates for medical applications
08/04/16Nanochannel device with three dimensional gradient by single step etching for molecular detection
08/04/16Cognitive displays
08/04/16Implementing dimm air flow baffle
08/04/16Utilizing automated lighting system to determine occupancy
08/04/16Trenched sample assembly for detection of analytes with electromagnetic read-write heads
08/04/16Determation of local contact potential difference by noncontact atomic force microscopy
08/04/16Method for the characterization and monitoring of integrated circuits
08/04/16Modifying a scan chain for improved fault diagnosis of integrated circuits
08/04/16Identification of molecules based on frequency responses using electromagnetic write-heads and magneto-resistive sensors
08/04/16Monitoring objects in motion along a static route using sensory detection devices
08/04/16Blind mating strain relieved optical fiber connector
08/04/16Blind mating strain relieved optical fiber connector
08/04/16Optical fiber routing mat
08/04/16Optical fiber routing mat
08/04/16Test pattern layout for test photomask and method for evaluating critical dimension changes
08/04/16Low-profile swing gate to support service element interface hardware
08/04/16Low-profile swing gate to support service element interface hardware
08/04/16Sleeve electromagnetic shield
08/04/16Implementing dimm air flow baffle
08/04/16Designating task execution order based on location of the task icons within a graphical user interface
08/04/16Controlling visualization of data by a dashboard widget
08/04/16User interface tap selection on touchscreen device
08/04/16Preallocating storage space for an application operation in a space efficient volume
08/04/16Data set management
08/04/16Selective erasure of expired files or extents in deduplicating virutal media for efficient file reclamation
08/04/16Dynamic caching module selection for optimized data deduplication
08/04/16Controlling partner partitions in a clustered storage system
08/04/16Essential metadata replication
08/04/16Memory power management and data consolidation
08/04/16Extendible input/output data mechanism for accelerators
08/04/16Synchronization for initialization of a remote mirror storage facility
08/04/16Preallocating storage space for an application operation in a space efficient volume
08/04/16Consolidating and reusing portal information
08/04/16Compact data marshaller generation
08/04/16Extensible execution unit interface architecture with multiple decode logic and multiple execution units
08/04/16Extensible execution unit interface architecture with multiple decode logic and multiple execution units
08/04/16Parsing-enhancement facility
08/04/16Concurrent multiple instruction issue of non-pipelined instructions using non-pipelined operation resources in another processing core
08/04/16Processor with hybrid pipeline capable of operating in out-of-order and in-order modes
08/04/16Managing a floating window
08/04/16Template containers for business process management
08/04/16Using a mobile device to transfer virtual machine between computers while preserving session
08/04/16Using a mobile device to transfer virtual machine between computers while preserving session
08/04/16Migration of executing applications and associated stored data
08/04/16Determining an optimal computing environment for running an image
08/04/16Autonomous dynamic optimization of platform resources
08/04/16Autonomous dynamic optimization of platform resources
08/04/16Placement of virtual cpus using a hardware multithreading parameter
08/04/16Full exploitation of parallel processors for data processing
08/04/16Associating energy consumption with a virtual machine
08/04/16Identifying solutions to application execution problems in distributed computing environments
08/04/16Storing data using a dual path storage approach
08/04/16Contacting remote support (call home) and reporting a catastrophic event with supporting documentation
08/04/16Error monitoring of a memory device containing embedded error correction
08/04/16Capturing compression efficiency metrics for processing data
08/04/16Enhanced restart of a core dumping application
08/04/16Restore of full system backup and incremental backups using multiple simultaneous device streams
08/04/16Analyzing and correcting corruption which caused filesystem checker failure so that the filesystem checker will run without error
08/04/16Sizing a write cache buffer based on emergency data save parameters
08/04/16Test generation using expected mode of the target hardware device
08/04/16Validation of multiprocessor hardware component
08/04/16Operations interlock under dynamic relocation of storage
08/04/16Hierarchical cache structure and handling thereof
08/04/16Matrix ordering for cache efficiency in performing large sparse matrix operations
08/04/16Multiprocessor cache buffer management
08/04/16Controlling operations according to another system's architecture
08/04/16Placement of input / output adapter cards in a server
08/04/16Techniques for mapping device addresses to physical memory addresses
08/04/16Distributed file serving architecture system with metadata storage virtualization and data access at the data server connection speed
08/04/16Modification of a portlet
08/04/16Modification of a portlet
08/04/16Gauging credibility of digital content items
08/04/16Weighting search criteria based on similarities to an ingested corpus in a question and answer (qa) system
08/04/16Determination of a service description most closely matching a specified service name
08/04/16Filesystem with isolated independent filesets
08/04/16Atomically moving data elements between or within linked data structures
08/04/16Analyzing and correcting corruption which caused filesystem checker failure so that the filesystem checker will run without error
08/04/16Managing data sets of a storage system
08/04/16Identifying relationships between entities using two-dimensional arrays of scalar elements and a block matrix
08/04/16Atomically moving data elements between or within linked data structures
08/04/16Reducing a large amount of data to a size available for interactive analysis
08/04/16Workflow processing system and method with database system support
08/04/16Forecasting query access plan obsolescence
08/04/16Reducing a large amount of data to a size available for interactive analysis
08/04/16Analysis of data utilization
08/04/16Providing access to message headers
08/04/16Detection and creation of appropriate row concept during automated model generation
08/04/16Detection and creation of appropriate row concept during automated model generation
08/04/16Context based passage retreival and scoring in a question answering system
08/04/16Monitoring a communication and retrieving information relevant to the communication
08/04/16Forecasting query access plan obsolescence
08/04/16Multi-dimension variable predictive modeling for analysis acceleration
08/04/16Test pattern layout for test photomask and method for evaluating critical dimension changes
08/04/16Risk-based credential management
08/04/16File integrity preservation
08/04/16Secure format-preserving encryption of data fields
08/04/16Secure format-preserving encryption of data fields
08/04/16Mobile device-based keypad for enhanced security
08/04/16Role-based tracking and surveillance
08/04/16Social connection via real-time image comparison
08/04/16Scalable image distribution in virtualized server environments
08/04/16Discovering and using informative looping signals in a pulsed neural network having temporal encoders
08/04/16Neuromorphic event-driven neural computing architecture in a scalable neural network
08/04/16Producing spike-timing dependent plasticity in a neuromorphic network utilizing phase change synaptic devices
08/04/16Discovering and using informative looping signals in a pulsed neural network having temporal encoders
08/04/16Scaling multi-core neurosynaptic networks across chip boundaries
08/04/16Producing spike-timing dependent plasticity in a neuromorphic network utilizing phase change synaptic devices
08/04/16Group generation using sets of metrics and predicted success values
08/04/16Joint meeting scheduling and carpooling
08/04/16Template containers for business process management
08/04/16Extraction of system administrator actions to a workflow providing a resolution to a system issue
08/04/16Joint meeting scheduling and carpooling
08/04/16Distributed digital rights-managed file transfer and access control
08/04/16Distributed digital rights-managed file transfer and access control
08/04/16Determining an optimal payment instrument by a cloud-enabled mobile payment service
08/04/16Product market lifecycle driven recommendations
08/04/16Identifying cyclic patterns of complex events
08/04/16Hardware management and reconstruction using visual graphics
08/04/16State-changeable device
08/04/16Normally closed microelectromechanical switches (mems), methods of manufacture and design structures
08/04/16Reducing substrate bowing caused by high percentage sige layers
08/04/16Nitridation on hdp oxide before high-k deposition to prevent oxygen ingress
08/04/16Nitridation on hdp oxide before high-k deposition to prevent oxygen ingress
08/04/16Method for quadruple frequency finfets with single-fin removal
08/04/16Defect reduction in iii-v semiconductor epitaxy through capped high temperature annealing
08/04/16Methods of forming fin isolation regions on finfet semiconductor devices by implantation of an oxidation-retarding material
08/04/16Formation of isolation surrounding well implantation
08/04/16Methods of forming fin isolation regions on finfet semiconductor devices using an oxidation-blocking layer of material and by performing a fin-trimming process
08/04/16Coreless multi-layer circuit substrate with minimized pad capacitance
08/04/16Polygon die packaging
08/04/16Iii-v cmos integration on silicon substrate via embedded germanium-containing layer
08/04/16Replacement fin process in ssoi wafer
08/04/16Replacement fin process in ssoi wafer
08/04/16Aspect ratio trapping and lattice engineering for iii/v semiconductors
08/04/16Trenched gate with sidewall airgap spacer
08/04/16Control of current collapse in thin patterned gan
08/04/16In situ nitrogen doping of co-evaporated copper-zinc-tin-sulfo-selenide by nitrogen plasma
08/04/16Low resistance, low reflection, and low cost contact grids for photovoltaic cells
08/04/16In situ nitrogen doping of co-evaporated copper-zinc-tin-sulfo-selenide by nitrogen plasma
08/04/16On-chip vertical three dimensional microstrip line with characteristic impedance tuning technique and design structures
08/04/16Complementary metal oxide semiconductor device with iii-v optical interconnect having iii-v epitaxial semiconductor material formed using lateral overgrowth
08/04/16Phase noise reduction in voltage controlled oscillators
08/04/16Phase noise reduction in voltage controlled oscillators
08/04/16Implementing enhanced bias configuration for cmos inverter based optical transimpedence amplifier
08/04/16Implementing enhanced cmos inverter based optical transimpedence amplifer
08/04/16Implementing enhanced bias configuration for cmos inverter based optical transimpedance amplifier
08/04/16Implementing enhanced cmos inverter based optical transimpedence amplifer
08/04/16Modulo-m binary counter
08/04/16Compression of integer data using a common divisor
08/04/16Selecting a data storage resource of a dispersed storage network
08/04/16Convolution-encoded hyper-speed channel with robust trellis error-correction
08/04/16Integrated parallel optical transceiver
08/04/16Integrated parallel optical transceiver
08/04/16Cipher text translation
08/04/16Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
08/04/16Port configuration for interconnected communications devices
08/04/16Packet i/o support for a logical switch router architecture
08/04/16Managing use of lease resources allocated on fallover in a high availability computing environment
08/04/16Social connection via real-time image comparison
08/04/16Smartphone indicator for conversation nonproductivity
08/04/16Overlay tunnel information exchange protocol
08/04/16Authentication using individual's inherent expression as secondary signature
08/04/16Dynamic enterprise security control based on user risk factors
08/04/16Risk-based credential management
08/04/16Method and apparatus for associating data loss protection (dlp) policies with endpoints
08/04/16Annotating collaborative information structures
08/04/16Utilization of target browsers
08/04/16Bulk uploading of multiple self-referencing objects
08/04/16Analysis of data utilization
08/04/16Predictive data replication and acceleration
08/04/16Enterprise peer-to-peer storage and method of managing peer network storage
08/04/16System and method for computation of relevance of an individual with a campaign in social media
08/04/16Cache control for web application resources
08/04/16Cache control for web application resources
08/04/16Management of sequentially scheduled conferences
08/04/16Utilizing eye tracking to determine attendee engagement
08/04/16Adjustment of media recording schedule based on broadcast content
07/28/16Cationic polyamines for treatment of viruses
07/28/16Lactide-based acrylate polymers
07/28/16Variable inlet vanes
07/28/16Variable inlet vanes
07/28/16Changeable, airflow venting cover assembly for an electronics rack
07/28/16Determination of young's modulus of porous thin films using ultra-low load nano-indentation
07/28/16Determining the current return path integrity in an electric device connected or connectable to a further device
07/28/16Pressure sensing and control for semiconductor wafer probing
07/28/16Implementing enhanced scan chain diagnostics via bypass multiplexing structure
07/28/16Implementing enhanced scan chain diagnostics via bypass multiplexing structure
07/28/16Graphene plasmonic communication link
07/28/16276-pin buffered memory card with enhanced memory system interconnect
07/28/16Selectable flattening hierarchical object browser
07/28/16Storage management in a multi-tiered storage architecture
07/28/16Providing a reserved data area to use to extend a data set
07/28/16Dynamic drive selection for migration of files based on file size for a data storage system
07/28/16Memory access alignment in a double data rate ('ddr') system
07/28/16Clearing specified blocks of main storage
07/28/16Object storage power consumption optimization
07/28/16Access operation with dynamic linking and access of data within plural data sources
07/28/16System and method for determining when cloud virtual machines need to be updated
07/28/16Calculating confidence values for source code based on availability of experts
07/28/16Correcting non-compliant source code in an integrated development environment
07/28/16Clearing specified blocks of main storage
07/28/16Transaction abort processing
07/28/16Efficiency of an instruction cache by retrieving instructions for completing a single branch backwards short loop from a local loop buffer
07/28/16Branch prediction using multiple versions of history data
07/28/16Provisioning virtual cpus using a hardware multithreading parameter in hosts with split core processors
07/28/16Deployment groups analytics and visibility
07/28/16Deployment groups analytics and visibility
07/28/16Sensor virtualization through cloud storage and retrieval mechanisms
07/28/16Providing a custom virtual appliance
07/28/16Determining workflow completion state
07/28/16Determining workflow completion state
07/28/16Evaluation of complex san environments
07/28/16Coordination of spare lane usage between link partners
07/28/16Processing of pdse extended sharing violations among sysplexes with a shared dasd
07/28/16Virtual machine backup
07/28/16Unobtrusive failover in clustered network-attached storage
07/28/16Identifying syntaxes of disparate components of a computer-to-computer message
07/28/16Determining test case efficiency
07/28/16Performing dynamic data generation and verification for functional validation of data manipulation programs
07/28/16Performing dynamic data generation and verification for functional validation of data manipulation programs
07/28/16Regression testing of sql execution plans for sql statements
07/28/16Sparsity-driven matrix representation to optimize operational and storage efficiency
07/28/16Processing unit reclaiming requests in a solid state memory device
07/28/16Cache allocation in a computerized system
07/28/16Fast write and management of persistent cache in a system that includes tertiary storage
07/28/16Speculative cache reading using shared buffer
07/28/16Maintaining order with parallel access data streams
07/28/16Dynamically controlling a file system write cache
07/28/16Systems and methods for background destaging storage tracks
07/28/16Implementing modal selection of bimodal coherent accelerator
07/28/16Implementing modal selection of bimodal coherent accelerator
07/28/16Host based non-volatile memory clustering using network mapped storage
07/28/16Autonomous gadget management system
07/28/16Flexible control in resizing of visual displays
07/28/16Contextual validation of synonyms in otology driven natural language processing
07/28/16Indexing and searching heterogenous data entities
07/28/16Method of manipulating vocabulary depending on the audience
07/28/16Method of manipulating vocabulary depending on the audience
07/28/16Eviction stream for data joins
07/28/16Preserving high value entries in an event log
07/28/16Management of memory usage using usage analytics
07/28/16Tracking model element changes using change logs
07/28/16Search-based detection, link, and acquisition of data
07/28/16Search-based detection, link, and acquisition of data
07/28/16Materialized query tables with shared data
07/28/16Eviction stream for data joins
07/28/16Population of context-based data gravity wells
07/28/16Distributed fuzzy search and join with edit distance guarantees
07/28/16Representing identity data relationships using graphs
07/28/16Etl tool interface for remote mainframes
07/28/16Representation of time-sensitive and space-sensitive profile information
07/28/16Dynamic creation of domain specific corpora
07/28/16Fusion of cluster labeling algorithms by analyzing sub-clusters
07/28/16Measuring corpus authority for the answer to a question
07/28/16Authentication based on proximate devices
07/28/16Static timing analysis (sta) using derived boundary timing constraints for out-of-context (ooc) hierarchical entity analysis and abstraction
07/28/16Reduction of warpage of multilayered substrate or package
07/28/16Critical region identification
07/28/16Optical proximity correction (opc) accounting for critical dimension (cd) variation from inter-level effects
07/28/16Medical imaging region-of-interest detection employing visual-textual relationship modelling.
07/28/16Detecting heap spraying on a computer
07/28/16Masking of haptic data
07/28/16Dynamically linked content creation in a secure processing environment
07/28/16Facial recognition with biometric pre-filters
07/28/16Role-based tracking and surveillance
07/28/16Training machine learning models for open-domain question answering system
07/28/16Dataset classification quantification
07/28/16People queue optimization and coordination
07/28/16Resource account application management
07/28/16Client-side security for tokenized transactions
07/28/16Resource account application management
07/28/16Client-side security for tokenized transactions
07/28/16Use-based software incentives
07/28/16E-commerce messaging using sms
07/28/16Constraining fir filter taps in an adaptive architecture
07/28/16Underlayers for textured films of heusler compounds
07/28/16Symmetric multi-port inductor for differential multi-band rf circuits
07/28/16Intermetallic compound filled vias
07/28/16Multilayer structure in an integrated circuit for damage prevention and detection and methods of creating the same
07/28/16Silicon nitride fill for pc gap regions to increase cell density
07/28/16Integrated circuit with back side inductor
07/28/16Integration of strained silicon germanium pfet device and silicon nfet device for finfet structures
07/28/16Lateral bipolar transistor
07/28/16Integration of strained silicon germanium pfet device and silicon nfet device for finfet structures
07/28/16Low voltage transistor and logic devices with multiple, stacked piezoelectronic layers
07/28/16Spin transfer torque cell for magnetic random access memory
07/28/16Fringing field assisted dielectrophoresis assembly of carbon nanotubes
07/28/16Electrostatic discharge protection solutions
07/28/16Pad encoding and decoding
07/28/16Method of improving cloud resiliency
07/28/16Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment
07/28/16Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment
07/28/16Providing information on published configuration patterns of storage resources to client systems in a network computing environment
07/28/16Proactive identification of hotspots in a cloud computing environment
07/28/16Method to designate and implement new routing options for high priority data flows
07/28/16Congestion detection using a differentiated packet pair
07/28/16Managing workload to meet execution criterion in a hybrid cloud environment
07/28/16System and method for managing files to be attached to or detached from an electronic mail
07/28/16Providing data security with a token device
07/28/16Providing data security with a token device
07/28/16Sharing usb key by multiple virtual machines located at different hosts
07/28/16Shared mac blocking
07/28/16Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment
07/28/16Providing information on published configuration patterns of storage resources to client systems in a network computing environment
07/28/16Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment
07/28/16Storage management in a multi-tiered storage architecture
07/28/16Discriminating visual recognition program for digital cameras
07/28/16Providing interactive multimedia services
07/28/16Ensuring quality of bandwidth in a wi-fi connection to an internet access point
07/28/16Substrate via filling
07/28/16Latch and spring assembly
07/28/16Latch and spring assembly
07/28/16Screw attachment system for electronic assemblies
07/28/16Variable inlet vanes
07/21/16Methods and materials for therapeutic delivery
07/21/16Creating dynamic game activities for games
07/21/16Graphene layers for identification of products
07/21/16Package transport container and transport operations for an unmanned aerial vehicle
07/21/16Resource identification using historic well data
07/21/16Locking quick connect spray shield with visual indicator
07/21/16Locking quick connect spray shield with visual indicator
07/21/16Nanofluidic channels with gradual depth change for reducing entropic barrier of biopolymers
07/21/16Test structure to measure delay variability mismatch of digital logic paths
07/21/16Three-dimensional processing system having at least one layer with circuitry dedicated to scan testing and system state checkpointing of other system layers
07/21/16Optical device
07/21/16Optical module and method for manufacturing optical module
07/21/16Distributed, unmanned aerial vehicle package transport network
07/21/16Electronic circuit device with electromagnetic clock signal conveyed along cooling fluid conduit network
07/21/16Scroll focus
07/21/16Implementing paging optimization to avoid populate on page fault during an io read
07/21/16Determining a cause for low disk space with respect to a logical disk
07/21/16File system snapshot data management in a multi-tier storage environment
07/21/16Pipelined modular reduction and division
07/21/16Specifying data in a standards style pattern of service-oriented architecture (soa) environments
07/21/16Predicting and using utility of script execution in functional web crawling and other crawling
07/21/16Managing a code load
07/21/16Convert to zoned format from decimal floating point format
07/21/16Convert from zoned format to decimal floating point format
07/21/16Local instruction loop buffer utilizing execution unit register file
07/21/16Local instruction loop buffer utilizing execution unit register file
07/21/16Accelerated execution of target of execute instruction
07/21/16Convert from zoned format to decimal floating point format
07/21/16Convert to zoned format from decimal floating point format
07/21/16Accelerated instruction execution
07/21/16Scheduling in job execution
07/21/16String dataflow error detection
07/21/16Multi-stage failure analysis and prediction
07/21/16Managing spaces in memory
07/21/16Resource integrity during partial backout of application updates
07/21/16Virtual machine backup
07/21/16Protecting data segments in a computing environment
07/21/16Providing a recovery placeholder within an application
07/21/16Restoring redundancy in a storage group when a storage device in the storage group fails
07/21/16Monitoring system noises in parallel computer systems
07/21/16Measuring execution time of benchmark programs in a simulated environment
07/21/16Measuring execution time of benchmark programs in a simulated environment
07/21/16Enhanced string analysis that improves accuracy of static analysis
07/21/16Detecting potential class loader problems using the class search path sequence for each class loader
07/21/16Selectable data on file viewing in a debugger
07/21/16Selectable data on file viewing in a debugger
07/21/16Detecting potential class loader problems using the class search path sequence for each class loader
07/21/16Automatically generating testcases
07/21/16Virtual disk alignment access
07/21/16Virtual disk alignment access
07/21/16Implementing paging optimization to avoid populate on page fault during an io read
07/21/16Scheduling and execution of dag-structured computation on rdma-connected clusters
07/21/16Rich text handling for a web application
07/21/16Generating an electronic form locally on a client computer from input parameters
07/21/16Preventing frustration in online chat communication
07/21/16Preventing frustration in online chat communication
07/21/16File system snapshot data management in a multi-tier storage environment
07/21/16Disk utilization analysis
07/21/16Effective method to compress tabular data export files for data movement
07/21/16Geospatial event extraction and analysis through data sources
07/21/16Geospatial queries using associated distribution data
07/21/16Identifying related information in dissimilar data
07/21/16Distributed system with accelerator-created containers
07/21/16Classifying entities by behavior
07/21/16Parallel load in a column-store database
07/21/16Efficient b-tree data serialization
07/21/16Temporal auditing
07/21/16Compression of serialized b-tree data
07/21/16Distributed system with accelerator and catalog
07/21/16Database statistical histogram forecasting
07/21/16Efficient partitioned joins in a database with column-major layout
07/21/16Replicating data across multiple copies of a table in a database system
07/21/16Scoring relationships between entities based on proximity in space and time
07/21/16Scoring relationships between entities based on proximity in space and time
07/21/16Predicting and using utility of script execution in functional web crawling and other crawling
07/21/16Managing a web-based application's display
07/21/16Resource identification using historic well data
07/21/16Aligning event data with a hierarchical declarative process model
07/21/16Calculating circuit-level leakage using three dimensional technology computer aided design and a reduced number of transistors
07/21/16Scalable liveness verification via abstraction refinement
07/21/16Scalable liveness verification via abstraction refinement
07/21/16Multi-layer circuit using metal layers as a moisture diffusion barrier for electrical performance
07/21/16Collaborative electronic nose management in personal devices
07/21/16Sanitization of vitual machine images
07/21/16Sanitization of virtual machine images
07/21/16Managing global cache coherency in a distributed shared caching for clustered file systems
07/21/16Protecting content displayed on a mobile device
07/21/16Access and protection of i2c interfaces
07/21/16Predicting the impact of change on events detected in application logic
07/21/16Detection of communication topic change
07/21/16Analysis of project management
07/21/16Analysis of project management
07/21/16Analysis of project management
07/21/16Providing a requisite level of service for an electronic meeting
07/21/16Order offload
07/21/16Automatic boundary detection and transaction completion
07/21/16Comprehensive tsunami alert system via mobile devices
07/21/16Vehicle-based abnormal travel event detecting and reporting
07/21/16Reorganizing display of a railway timetable diagram
07/21/16Pronunciation accuracy in speech recognition
07/21/16Tape media kiss-contact read verification
07/21/16Memory access device for memory sharing among plurality of processors, and access method for same
07/21/16Semiconductor structure with airgap
07/21/16Fabrication of iii-v-on-insulator platforms for semiconductor devices
07/21/16Method to protect against contact related shorts on utbb
07/21/16Multi-layer circuit using metal layers as a moisture diffusion barrier for electrical performance
07/21/16Reduced volume interconnect for three-dimensional chip stack
07/21/16Single source/drain epitaxy for co-integrating nfet semiconductor fins and pfet semiconductor fins
07/21/16Complementary metal-oxide silicon having silicon and silicon germanium channels
07/21/16Complementary metal-oxide silicon having silicon and silicon germanium channels
07/21/16Implantation formed metal-insulator-semiconductor (mis) contacts
07/21/16Implantation formed metal-insulator-semiconductor (mis) contacts
07/21/16Implantation formed metal-insulator-semiconductor (mis) contacts
07/21/16Finfet with dielectric isolated channel
07/21/16Josephson junction with spacer
07/21/16Multi-layer circuit using metal layers as a moisture diffusion barrier for electrical performance
07/21/16Controlling a fault-tolerant array of converters
07/21/16Stitchable global clock for 3d chips
07/21/16String dataflow error detection
07/21/16Multiple erasure codes for distributed storage
07/21/16Distributed map reduce network
07/21/16Correlating road network information and user mobility information for wireless communication network planning
07/21/16Graph segment representing a gist of an online social network conversation
07/21/16Graph segment representing a gist of an online social network conversation
07/21/16Fast recovery of multicast router ports on spanning tree protocol (stp) topology change in a layer 2 (l2) network
07/21/16Host-based load balancing of network traffic
07/21/16Optimization of computer system logical partition migrations in a multiple computer system environment
07/21/16Adaptive algorithm for cloud admission policies
07/21/16Social media message delivery based on user location
07/21/16Secure virtualized mobile cellular device
07/21/16User authentication relying on recurring public events for shared secrets
07/21/16Secure identity authentication in an electronic transaction
07/21/16Administration of a context-based cloud security assurance system
07/21/16Optimization of computer system logical partition migrations in a multiple computer system environment
07/21/16Multi-site heat map management
07/21/16Live partition mobility with shared persistent reservations
07/21/16Computer room environment servicing
07/21/16Participating in a peer-to-peer communication session
07/21/16Use of simultaneously received videos by a system to generate a quality of experience value
07/21/16Use of simultaneously received videos by a system to generate a quality of experience value
07/21/16Network load estimation and prediction for cellular networks
07/14/16Use of a support device
07/14/16Nanofluidic channels with gradual depth change for reducing entropic barrier of biopolymers
07/14/16Recyclate verification
07/14/16Integrated on chip detector and zero waveguide module structure for use in dna sequencing
07/14/16Universal system for mounting rack doors
07/14/16Modifying travel estimates
07/14/16Confidential route monitoring with traveler-configured traveler safety alerts
07/14/16Water quality monitoring and early event detection
07/14/16Recyclate verification
07/14/16Automated irrigation control system
07/14/16Power profile management
07/14/16Integrated circuit having regulated voltage island power system
07/14/16Microfluidics three-dimensional touch screen display
07/14/16System-wide topology and performance monitoring gui tool with per-partition views
07/14/16Generating visualizations of facet values for facets defined over a collection of objects
07/14/16Continuously changing unlock pattern using moving icons
07/14/16System and method for displaying published electronic documents
07/14/16Touch screen tactile gestures for data manipulation
07/14/16Detecting input based on multiple gestures
07/14/16Supplementing a virtual input keyboard
07/14/16Method and apparatus for optimizing the performance of a storage system
07/14/16Application backup and restore
07/14/16Threshold based incremental flashcopy backup of a raid protected array
07/14/16Modular architecture for extreme-scale distributed processing applications
07/14/16Impact-based migration scheduling
07/14/16Shift significand of decimal floating point data
07/14/16Deployment pattern monitoring
07/14/16Synchronizing comments in source code with text documents
07/14/16Floating point execution unit for calculating packed sum of absolute differences
07/14/16Floating point execution unit for calculating packed sum of absolute differences
07/14/16Instruction to load data up to a specified memory boundary indicated by the instruction
07/14/16Indirect instruction predication
07/14/16Indirect instruction predication
07/14/16Instruction for performing a pseudorandom number generate operation
07/14/16Parallel slice processor having a recirculating load-store queue for fast deallocation of issue queue entries
07/14/16Parallel slice processing method using a recirculating load-store queue for fast deallocation of issue queue entries
07/14/16Reconfigurable parallel execution and load-store slice processor
07/14/16Linkable issue queue parallel execution slice for a processor
07/14/16Reconfigurable parallel execution and load-store slice processing methods
07/14/16Linkable issue queue parallel execution slice processing method
07/14/16Instruction stream tracing of multi-threaded processors
07/14/16Generation of usage tips
07/14/16Generation of usage tips
07/14/16Re-launching contextually related application sets
07/14/16Dynamic sharing of unused bandwidth capacity of virtualized input/output adapters
07/14/16Computer system using partially functional processor core
07/14/16Dynamic sharing of unused bandwidth capacity of virtualized input/output adapters
07/14/16Method and system for modeling and analyzing computing resource requirements of software applications in a shared and distributed computing environment
07/14/16Framework to improve parallel job workflow
07/14/16Second failure data capture in co-operating multi-image systems
07/14/16Predicting a likelihood of a critical storage problem
07/14/16Link speed downshifting for error determination and performance enhancements
07/14/16Data replication in a database management system
07/14/16Priority based failover for databases
07/14/16Synchronized flashcopy backup restore of a raid protected array
07/14/16Resource planning for data protection validation
07/14/16Optimizing restoration of deduplicated data
07/14/16Real time backup system for computer users
07/14/16Priority based failover for databases
07/14/16Comparative program execution through control of two or more debug sessions to automatically determine execution differences
07/14/16Instruction stream tracing of multi-threaded processors
07/14/16Verification of management of real storage via multi-threaded thrashers in multiple address spaces
07/14/16Filtering snoop traffic in a multiprocessor computing system
07/14/16Implementing health check for optical cable attached pcie enclosure
07/14/16Efficient remote pointer sharing for enhanced access to key-value stores
07/14/16Intelligent text annotation
07/14/16Intention detection in domain-specific information
07/14/16Extraction of lexical kernel units from a domain-specific lexicon
07/14/16Extraction of lexical kernel units from a domain-specific lexicon
07/14/16Cognitive contextualization of emergency management system communications
07/14/16In-memory latch-free index structure
07/14/16Managing data in a cache memory of a question answering system
07/14/16Storing data files in a file system
07/14/16Replica identification and collision avoidance in file system replication
07/14/16Hardware for a bitmap data structure for efficient storage of heterogeneous lists
07/14/16Image search result navigation with ontology tree
07/14/16Modifying recipes to reduce preparation times and/or incorporate preferred ingredients
07/14/16Context aware query selection
07/14/16Generating a virtual dynamic representative of a taxonomic group with unique inheritance of attributes
07/14/16Method and apparatus for storing sparse graph data as multi-dimensional cluster
07/14/16Enhanced knowledge delivery and attainment using a question answering system
07/14/16Image search result navigation with ontology tree
07/14/16Answering user questions based on user expertise level
07/14/16Numerical computation of profiled degrees of alignment in social networking
07/14/16Method and apparatus for identifying the optimal schema to store graph data in a relational store
07/14/16Dna sequencing using mosfet transistors
07/14/16Continuously changing unlock pattern using moving icons
07/14/16Edge access control in querying facts stored in graph databases
07/14/16Providing volume indicators based on received images of containers
07/14/16Processing apparatus, processing method, and program
07/14/16Information technology asset type identification using a mobile vision-enabled robot
07/14/16Neuromorphic memory circuit
07/14/16Sensor based truth maintenance
07/14/16Cohort half life forecasting combination from a confident jury
07/14/16Inferred facts discovered through knowledge graph derived contextual overlays
07/14/16Self-adaptive classifiers
07/14/16System and method for using graph transduction techniques to make relational classifications on a single connected network
07/14/16User-guided teaching an object of a deictic reference to a machine
07/14/16Iterative pattern generation algorithm for plate design problems
07/14/16Optimization of trait and expertise for workforce selection
07/14/16Evaluating and displaying feedback for an item distributed to a group of users at a collaborative event
07/14/16Transforming a base multi-tenant cloud to a white labeled reseller cloud
07/14/16Determining camera height using distributions of object heights and object image heights
07/14/16Aggregating graph structures
07/14/16Display of context based animated content in electronic map
07/14/16Displaying location-based rules on augmented reality glasses
07/14/16Providing volume indicators based on received images of containers
07/14/16Augmented reality device display of image recognition analysis matches
07/14/16Identifying the origins of a vehicular impact and the selective exchange of data pertaining to the impact
07/14/16Determining a restricted apparatus with respect to a location
07/14/16Traffic network sensor placement
07/14/16Multichannel data storage apparatus having abrasion resistant barrier
07/14/16Tunable negative bitline write assist and boost attenuation circuit
07/14/16Neuromorphic memory circuit
07/14/16Thin film inductor with extended yokes
07/14/16Device isolation for iii-v substrates
07/14/16Asymmetric high-k dielectric for reducing gate induced drain leakage
07/14/16Asymmetric high-k dielectric for reducing gate induced drain leakage
07/14/16Asymmetric high-k dielectric for reducing gate induced drain leakage
07/14/16Low temperature adhesive resins for wafer bonding
07/14/16Substrate including selectively formed barrier layer
07/14/16Integrated circuit heat dissipation using nanostructures
07/14/16Size-filtered multimetal structures
07/14/16Semiconductor device with reduced via resistance
07/14/16Bonding process using temperature controlled curvature change
07/14/16Strain release in pfet regions
07/14/16Finfet with reduced capacitance
07/14/16Method and structure for improving finfet with epitaxy source/drain
07/14/16Self-formation of high-density arrays of nanostructures
07/14/16Stacked graphene field-effect transistor
07/14/16Asymmetric high-k dielectric for reducing gate induced drain leakage
07/14/16Self-limiting silicide in highly scaled fin technology
07/14/16Asymmetric high-k dielectric for reducing gate induced drain leakage
07/14/16Bottom-up metal gate formation on replacement metal gate finfet devices
07/14/16Finfet with reduced capacitance
07/14/16Integrated circuit heat dissipation using nanostructures
07/14/16Bipolar transistor with carbon alloyed contacts
07/14/16Iii-v mosfet with strained channel and semi-insulating bottom barrier
07/14/16Self-aligned contact process enabled by low temperature
07/14/16Three-dimensional conductive electrode for solar cell
07/14/16Buffer layer for high performing and low light degraded solar cells
07/14/16Substrate-free thin-film flexible photovoltaic device and fabrication method
07/14/16Removal of spurious microwave modes via flip-chip crossover
07/14/16Removal of spurious microwave modes via flip-chip crossover
07/14/16Boosting varactor capacitance ratio
07/14/16Boosting varactor capacitance ratio
07/14/16Hierarchical data compression and computation
07/14/16Hierarchical data compression and computation
07/14/16Hierarchical data compression and computation
07/14/16Dynamically allocating compute nodes among cloud groups based on priority and policies
07/14/16Encrypting data
07/14/16Event and alert analysis in a distributed processing system
07/14/16Isolating the sources of faults/potential faults within computing networks
07/14/16Isolating the sources of faults/potential faults within computing networks
07/14/16Dynamically managing a system of servers
07/14/16Service broker for computational offloading and improved resource utilization
07/14/16Prediction-based provisioning planning for cloud environments
07/14/16Correlating contact type with appropriate communications to eliminate inadvertent communications
07/14/16Dynamic adjustment of authentication mechanism
07/14/16Determining a risk level for server health check processing
07/14/16Multifusion of a stream operator in a streaming application
07/14/16Hardware level generated interrupts indicating load balancing status for a node in a virtualized computing environment
07/14/16Parallel data streaming between cloud-based applications and massively parallel systems
07/14/16Service broker for computational offloading and improved resource utilization
07/14/16Registration of cim agent to management agent and system
07/14/16Control method and apparatus for publish/subscribe systems
07/14/16Gathering information for members of call
07/14/16Gathering information for members of call
07/14/16Collaborative response using capabilities-aware hive network
07/14/16Anonymous notification message generator
07/14/16Dual pulse driven extreme ultraviolet (euv) radiation source
07/07/16Bio-chips and nano-biochips
07/07/16Conducting challenge events
07/07/16Managing challenge events
07/07/16High-performance, filler-reinforced, recyclable composite materials
07/07/16Destination-configured topic information updates
07/07/16Through-substrate optical coupling to photonics chips
07/07/16Automated modularization of graphical user interface test cases
07/07/16Rearranging display of mobile applications based on geolocation
07/07/16Management of extent migration on tiered storage
07/07/16Management of extent migration on tiered storage
07/07/16Management of memory pages
07/07/16Management of a secure delete operation
07/07/16Random read performance of optical media library
07/07/16Efficient elimination of access to data on a writable storage media
07/07/16Apparatus and method for realizing runtime system for programming language
07/07/16Dynamic java bean for visualage for java
07/07/16Binary file for computer program having multiple executable code variants for a function that are executable on a same processor architecture
07/07/16Selectively hotpatching only a selection of processes of a running instance of an application that match a selection criteria
07/07/16Smart validated code searching system
07/07/16Resource serialization in a transactional execution facility
07/07/16Sharing program interrupt logic in a multithreaded processor
07/07/16Salvaging hardware transactions
07/07/16Automated exploitation of virtual machine resource modifications
07/07/16Determining when a change set was delivered to a workspace or stream and by whom
07/07/16Second failure data capture in co-operating multi-image systems
07/07/16Storage integrity validator
07/07/16Read buffer architecture supporting integrated xor-reconstructed and read-retry for non-volatile random access memory (nvram) systems
07/07/16Data asset reconstruction
07/07/16Salvaging hardware transactions
07/07/16Using transactional execution for reliability and recovery of transient failures
07/07/16Using transactional execution for reliability and recovery of transient failures
07/07/16Providing data to a user interface for performance monitoring
07/07/16Deployment and deployment planning as a service
07/07/16Extraction of problem diagnostic knowledge from test cases
07/07/16Smart validated code searching system
07/07/16Heat-based key-value slot organization for flash-optimized data placement in multi-tiered storage systems
07/07/16Providing data to a user interface for performance monitoring
07/07/16Demote instruction for relinquishing cache line ownership
07/07/16Updatable address lookup application program interface
07/07/16Generating navigable content overviews
07/07/16Reprocess problematic sections of input documents
07/07/16Reprocess problematic sections of input documents
07/07/16Distributed failover for unavailable content
07/07/16Estimating article publication dates and authors based on social media context
07/07/16Method and system for backup and recovery
07/07/16Identifying content under access control
07/07/16Augmenting an information request
07/07/16Tailoring question answer results to personality traits
07/07/16Prioritizing video surveillance media
07/07/16Hierarchical data compression and computation
07/07/16Indexing and querying spatial graphs
07/07/16Multiple partial-image compositional searching
07/07/16Determining when a change set was delivered to a workspace or stream and by whom
07/07/16Alleviation of index hot spots in datasharing environment with remote update and provisional keys
07/07/16Alleviation of index hot spots in datasharing environment with remote update and provisional keys
07/07/16Optimizing storage in a publish / subscribe environment
07/07/16Rendezvous-based optimistic concurrency control
07/07/16Apply corrections to an ingested corpus
07/07/16Determining answer stability in a question answering system
07/07/16Technology for join processing
07/07/16Technology for join processing
07/07/16Runtime tuple attribute compression
07/07/16Range query methods and apparatus
07/07/16Cross column searching a relational database table
07/07/16Corpus augmentation system
07/07/16Personalized question and answer system output based on personality traits
07/07/16Distributed failover for unavailable content
07/07/16Reconstitution order of entity evaluations
07/07/16Cross-domain clusterability evaluation for cross-guided data clustering based on alignment between data domains
07/07/16Reconstitution order of entity evaluations
07/07/16Corpus augmentation system
07/07/16Cognitive interactive search based on personalized user model and context
07/07/16Re-ordering search results based on viewed pages
07/07/16Estimating article publication dates and authors based on social media context
07/07/16Simulating a large network load
07/07/16Simulating a large network load
07/07/16Remediation of security vulnerabilities in computer software
07/07/16Remediation of security vulnerabilities in computer software
07/07/16Photographic copy prevention of a screen image
07/07/16Limiting exposure to compliance and risk in a cloud environment
07/07/16Limiting exposure to compliance and risk in a cloud environment
07/07/16Processing visible coding sequence, playing visible coding sequence
07/07/16Method for recommending content to ingest as corpora based on interaction history in natural language question and answering systems
07/07/16Method for recommending content to ingest as corpora based on interaction history in natural language question and answering systems
07/07/16Crowdsource reasoning process to facilitate question answering
07/07/16Diagnosing incidents for information technology service management
07/07/16Optical rule checking for detecting at risk structures for overlay issues
07/07/16Augmenting answer keys with key characteristics for training question and answer systems
07/07/16Information processing apparatus, program, and information processing method
07/07/16Operational data rationalization
07/07/16Detecting business anomalies utilizing information velocity and other parameters using statistical analysis
07/07/16Detecting business anomalies utilizing information velocity and other parameters using statistical analysis
07/07/16System, method and product for task allocation
07/07/16Embedded retail system
07/07/16Modified queue list generation
07/07/16Method to optimize the visualization of a map's projection based on data and tasks
07/07/16Method to optimize the visualization of a map's projection based on data and tasks
07/07/16Indexing and querying spatial graphs
07/07/16Tmr head design with insulative layers for shorting mitigation
07/07/16Miniskirt tape head having quasi-statically tilted transducer arrays
07/07/16Coarse actuator positioning algorithm
07/07/16Dynamically optimizing read performance by adjusting servo-based head location
07/07/16Low friction tape head
07/07/16Static memory cell with tfet storage elements
07/07/16Resistive random-access memory cells
07/07/16Fabrication of iii-v-on-insulator platforms for semiconductor devices
07/07/16Reduced external resistance finfet device
07/07/16Interconnect structures incorporating air-gap spacers
07/07/16Semiconductor device with reduced via resistance
07/07/16Self-aligned via interconnect structures
07/07/16Integrated circuit comprising pmos transistors with different voltage thresholds
07/07/16Self-aligned via interconnect structures
07/07/16Stacked via structure for metal fuse applications
07/07/16Ball grid array rework
07/07/16Semiconductor device with different fin sets
07/07/16Reduction of negative bias temperature instability
07/07/16Structure and method for advanced bulk fin isolation
07/07/16Structure and method for advanced bulk fin isolation
07/07/16Metal strap for dram/finfet combination
07/07/16Performance optimized gate structures
07/07/16High germanium content silicon germanium fins
07/07/16Iii-v nanowire fet with compositionally-graded channel and wide-bandgap core
07/07/16Replacement metal gate stack for diffusion prevention
07/07/16Low end parasitic capacitance finfet
07/07/16Vertical p-type, n-type, p-type (pnp) junction integrated circuit (ic) structure
07/07/16Finfet with dielectric isolation after gate module for improved source and drain region epitaxial growth
07/07/16Method to controllably etch silicon recess for ultra shallow junctions
07/07/16Method to controllably etch silicon recess for ultra shallow junctions
07/07/16Use of metal phosphorus in metallization of photovoltaic devices and method of fabricating same
07/07/16Cooling system for high performance solar concentrators
07/07/16Semiconductor device with programmable response
07/07/16Semi-conductor device with programmable response
07/07/16Hierarchical data compression and computation
07/07/16Monitoring of computer network resources having service level objectives
07/07/16Set up of direct mapped routers located across independently managed compute and storage networks
07/07/16Distributed online optimization for latency assignment and slicing
07/07/16Preserving collaboration history with relevant contextual information
07/07/16Preserving collaboration history with relevant contextual information
07/07/16Saving communication content to a social network environment
07/07/16Controller area network bus monitor
07/07/16Inter-domain replication of service information
07/07/16Modular framework to integrate service management systems and cloud orchestrators in a hybrid cloud environment
07/07/16Using a same program on a local system and a remote system
07/07/16Host-side cache migration
07/07/16File storage protocols header transformation in rdma operations
07/07/16Dynamic facial feature substitution for video conferencing
07/07/16Video projector with automated image enhancement
07/07/16Dynamic boundary based monitoring and metering
07/07/16Modular elements employing latches secured by linkages
07/07/16Bio-chips and nano-biochips
07/07/16Conducting challenge events
07/07/16Managing challenge events
07/07/16High-performance, filler-reinforced, recyclable composite materials
07/07/16Destination-configured topic information updates
07/07/16Through-substrate optical coupling to photonics chips
07/07/16Automated modularization of graphical user interface test cases
07/07/16Rearranging display of mobile applications based on geolocation
07/07/16Management of extent migration on tiered storage
07/07/16Management of extent migration on tiered storage
07/07/16Management of memory pages
07/07/16Management of a secure delete operation
07/07/16Random read performance of optical media library
07/07/16Efficient elimination of access to data on a writable storage media
07/07/16Apparatus and method for realizing runtime system for programming language
07/07/16Dynamic java bean for visualage for java
07/07/16Binary file for computer program having multiple executable code variants for a function that are executable on a same processor architecture
07/07/16Selectively hotpatching only a selection of processes of a running instance of an application that match a selection criteria
07/07/16Smart validated code searching system
07/07/16Resource serialization in a transactional execution facility
07/07/16Sharing program interrupt logic in a multithreaded processor
07/07/16Salvaging hardware transactions
07/07/16Automated exploitation of virtual machine resource modifications
07/07/16Determining when a change set was delivered to a workspace or stream and by whom
07/07/16Second failure data capture in co-operating multi-image systems
07/07/16Storage integrity validator
07/07/16Read buffer architecture supporting integrated xor-reconstructed and read-retry for non-volatile random access memory (nvram) systems
07/07/16Data asset reconstruction
07/07/16Salvaging hardware transactions
07/07/16Using transactional execution for reliability and recovery of transient failures
07/07/16Using transactional execution for reliability and recovery of transient failures
07/07/16Providing data to a user interface for performance monitoring
07/07/16Deployment and deployment planning as a service
07/07/16Extraction of problem diagnostic knowledge from test cases
07/07/16Smart validated code searching system
07/07/16Heat-based key-value slot organization for flash-optimized data placement in multi-tiered storage systems
07/07/16Providing data to a user interface for performance monitoring
07/07/16Demote instruction for relinquishing cache line ownership
07/07/16Updatable address lookup application program interface
07/07/16Generating navigable content overviews
07/07/16Reprocess problematic sections of input documents
07/07/16Reprocess problematic sections of input documents
07/07/16Distributed failover for unavailable content
07/07/16Estimating article publication dates and authors based on social media context
07/07/16Method and system for backup and recovery
07/07/16Identifying content under access control
07/07/16Augmenting an information request
07/07/16Tailoring question answer results to personality traits
07/07/16Prioritizing video surveillance media
07/07/16Hierarchical data compression and computation
07/07/16Indexing and querying spatial graphs
07/07/16Multiple partial-image compositional searching
07/07/16Determining when a change set was delivered to a workspace or stream and by whom
07/07/16Alleviation of index hot spots in datasharing environment with remote update and provisional keys
07/07/16Alleviation of index hot spots in datasharing environment with remote update and provisional keys
07/07/16Optimizing storage in a publish / subscribe environment
07/07/16Rendezvous-based optimistic concurrency control
07/07/16Apply corrections to an ingested corpus
07/07/16Determining answer stability in a question answering system
07/07/16Technology for join processing
07/07/16Technology for join processing
07/07/16Runtime tuple attribute compression
07/07/16Range query methods and apparatus
07/07/16Cross column searching a relational database table
07/07/16Corpus augmentation system
07/07/16Personalized question and answer system output based on personality traits
07/07/16Distributed failover for unavailable content
07/07/16Reconstitution order of entity evaluations
07/07/16Cross-domain clusterability evaluation for cross-guided data clustering based on alignment between data domains
07/07/16Reconstitution order of entity evaluations
07/07/16Corpus augmentation system
07/07/16Cognitive interactive search based on personalized user model and context
07/07/16Re-ordering search results based on viewed pages
07/07/16Estimating article publication dates and authors based on social media context
07/07/16Simulating a large network load
07/07/16Simulating a large network load
07/07/16Remediation of security vulnerabilities in computer software
07/07/16Remediation of security vulnerabilities in computer software
07/07/16Photographic copy prevention of a screen image
07/07/16Limiting exposure to compliance and risk in a cloud environment
07/07/16Limiting exposure to compliance and risk in a cloud environment
07/07/16Processing visible coding sequence, playing visible coding sequence
07/07/16Method for recommending content to ingest as corpora based on interaction history in natural language question and answering systems
07/07/16Method for recommending content to ingest as corpora based on interaction history in natural language question and answering systems
07/07/16Crowdsource reasoning process to facilitate question answering
07/07/16Diagnosing incidents for information technology service management
07/07/16Optical rule checking for detecting at risk structures for overlay issues
07/07/16Augmenting answer keys with key characteristics for training question and answer systems
07/07/16Information processing apparatus, program, and information processing method
07/07/16Operational data rationalization
07/07/16Detecting business anomalies utilizing information velocity and other parameters using statistical analysis
07/07/16Detecting business anomalies utilizing information velocity and other parameters using statistical analysis
07/07/16System, method and product for task allocation
07/07/16Embedded retail system
07/07/16Modified queue list generation
07/07/16Method to optimize the visualization of a map's projection based on data and tasks
07/07/16Method to optimize the visualization of a map's projection based on data and tasks
07/07/16Indexing and querying spatial graphs
07/07/16Tmr head design with insulative layers for shorting mitigation
07/07/16Miniskirt tape head having quasi-statically tilted transducer arrays
07/07/16Coarse actuator positioning algorithm
07/07/16Dynamically optimizing read performance by adjusting servo-based head location
07/07/16Low friction tape head
07/07/16Static memory cell with tfet storage elements
07/07/16Resistive random-access memory cells
07/07/16Fabrication of iii-v-on-insulator platforms for semiconductor devices
07/07/16Reduced external resistance finfet device
07/07/16Interconnect structures incorporating air-gap spacers
07/07/16Semiconductor device with reduced via resistance
07/07/16Self-aligned via interconnect structures
07/07/16Integrated circuit comprising pmos transistors with different voltage thresholds
07/07/16Self-aligned via interconnect structures
07/07/16Stacked via structure for metal fuse applications
07/07/16Ball grid array rework
07/07/16Semiconductor device with different fin sets
07/07/16Reduction of negative bias temperature instability
07/07/16Structure and method for advanced bulk fin isolation
07/07/16Structure and method for advanced bulk fin isolation
07/07/16Metal strap for dram/finfet combination
07/07/16Performance optimized gate structures
07/07/16High germanium content silicon germanium fins
07/07/16Iii-v nanowire fet with compositionally-graded channel and wide-bandgap core
07/07/16Replacement metal gate stack for diffusion prevention
07/07/16Low end parasitic capacitance finfet
07/07/16Vertical p-type, n-type, p-type (pnp) junction integrated circuit (ic) structure
07/07/16Finfet with dielectric isolation after gate module for improved source and drain region epitaxial growth
07/07/16Method to controllably etch silicon recess for ultra shallow junctions
07/07/16Method to controllably etch silicon recess for ultra shallow junctions
07/07/16Use of metal phosphorus in metallization of photovoltaic devices and method of fabricating same
07/07/16Cooling system for high performance solar concentrators
07/07/16Semiconductor device with programmable response
07/07/16Semi-conductor device with programmable response
07/07/16Hierarchical data compression and computation
07/07/16Monitoring of computer network resources having service level objectives
07/07/16Set up of direct mapped routers located across independently managed compute and storage networks
07/07/16Distributed online optimization for latency assignment and slicing
07/07/16Preserving collaboration history with relevant contextual information
07/07/16Preserving collaboration history with relevant contextual information
07/07/16Saving communication content to a social network environment
07/07/16Controller area network bus monitor
07/07/16Inter-domain replication of service information
07/07/16Modular framework to integrate service management systems and cloud orchestrators in a hybrid cloud environment
07/07/16Using a same program on a local system and a remote system
07/07/16Host-side cache migration
07/07/16File storage protocols header transformation in rdma operations
07/07/16Dynamic facial feature substitution for video conferencing
07/07/16Video projector with automated image enhancement
07/07/16Dynamic boundary based monitoring and metering
07/07/16Modular elements employing latches secured by linkages
06/30/16Laser ablation system including variable energy beam to minimize etch-stop material damage
06/30/16Key
06/30/16Formed hose with different fiber-reinforced regions
06/30/16Crowd-assisted micro-navigation
06/30/16Nanofluid sensor with real-time spatial sensing
06/30/16Dual optical and electrical lga contact
06/30/16Dual optical and electrical lga contact
06/30/16Enhanced security and resource utilization in a multi-operating system environment
06/30/16Displaying webpage information of parent tab associated with new child tab on graphical user interface
06/30/16Generating collapsed user interface interaction sequence controls in mobile applications
06/30/16Generating collapsed user interface interaction sequence controls in mobile applications
06/30/16Tool-tip for multimedia files
06/30/16Optimizing thin provisioning in a data storage system through selective use of multiple grain sizes
06/30/16Data storage system selectively employing multiple data compression techniques
06/30/16Promoting consistent response times in a data storage system having multiple data retrieval mechanisms
06/30/16Diagonal anti-diagonal memory structure
06/30/16Adapting erase cycle parameters to promote endurance of a memory
06/30/16Generating enumerated information in which a plurality of files are enumerated in a sequential medium
06/30/16Protecting data segments in a computing environment
06/30/16Computer instructions for limiting access violation reporting when accessing strings and similar data structures
06/30/16Memory management in presence of asymmetrical memory transfer cost
06/30/16Lifecycle management of solid state memory adaptors
06/30/16Hardware implementation of a tournament tree sort algorithm using an external memory
06/30/16Execution optimization of mobile applications
06/30/16Cloud infrastructure for reducing storage facility code load suspend rate by redundancy check
06/30/16Unified update tool for multi-protocol network adapter
06/30/16Branch target buffer for emulation environments
06/30/16Variable updates of branch prediction states
06/30/16Optimized migration of virtual objects across environments in a cloud computing environment
06/30/16Dynamic reduction of stream backpressure
06/30/16Method and system for application profiling for purposes of defining resource requirements
06/30/16Energy efficient supercomputer job allocation
06/30/16Method of facilitating live migration of virtual machines
06/30/16Composing applications on a mobile device
06/30/16Optimized system for analytics (graphs and sparse matrices) operations
06/30/16Coalescing stages in a multiple stage completion sequence
06/30/16Sophisticated run-time system for graph processing
06/30/16Reestablishing synchronization in a memory system
06/30/16Intra-rack and inter-rack erasure code distribution
06/30/16Management of microcode errors in a storage operation
06/30/16Data loading tool
06/30/16System and method for selective compression in a database backup operation
06/30/16Synchronization and order detection in a memory system
06/30/16Data storage system employing a hot spare to store and service accesses to data having lower associated wear
06/30/16Scalable distributed data store
06/30/16Fixing anti-patterns in javascript
06/30/16Testing functional correctness and idempotence of software automation scripts
06/30/16Testing functional correctness and idempotence of software automation scripts
06/30/16Managing assertions while compiling and debugging source code
06/30/16Managing assertions while compiling and debugging source code
06/30/16Testing application internal modules with instrumentation
06/30/16Detecting race condition vulnerabilities in computer software applications
06/30/16Collaborative computer aided test plan generation
06/30/16Efficient and secure direct storage device sharing in virtualized environments
06/30/16Efficient and secure direct storage device sharing in virtualized environments
06/30/16Extract target cache attribute facility and instruction therefor
06/30/16Processing page fault exceptions in supervisory software when accessing strings and similar data structures using normal load instructions
06/30/16Processing page fault exceptions in supervisory software when accessing strings and similar data structures using normal load instructions
06/30/16Storing a system-absolute address (saa) in a first level translation look-aside buffer (tlb)
06/30/16Atomic memory operations on an n-way linked list
06/30/16Cache structure for a computer system providing support for secure objects
06/30/16Computer instructions for limiting access violation reporting when accessing strings and similar data structures
06/30/16Pass-through converged network adaptor (cna) using existing ethernet switching device
06/30/16Verification of natural language processing derived attributes
06/30/16Suggesting patterns in unstructured documents
06/30/16Real-time shared web browsing among social network contacts
06/30/16Automated ontology building
06/30/16Generating a table of contents for unformatted text
06/30/16Automated ontology building
06/30/16Evaluating presentation data
06/30/16Techniques for suggesting patterns in unstructured documents
06/30/16Archival management of database logs
06/30/16Scan optimization using bloom filter synopsis
06/30/16Method for divisionally managing files on a user basis, and a storage system and computer program product thereof
06/30/16Virtual attribute federation system
06/30/16Product identification via image analysis
06/30/16Adapting data quality rules based upon user application requirements
06/30/16Hardware implementation of a tournament tree sort algorithm using an external memory
06/30/16Differentiated secondary index maintenance in log structured nosql data stores
06/30/16Updating web files based on detected legacy model file changes
06/30/16Updating web files based on detected legacy model file changes
06/30/16Updating progression of performing computer system maintenance
06/30/16Sophisticated run-time system for graph processing
06/30/16Rapid searching and matching of data to a dynamic set of signatures facilitating parallel processing and hardware acceleration
06/30/16Adapting data quality rules based upon user application requirements
06/30/16Differentiated secondary index maintenance in log structured nosql data stores
06/30/16Indexing of large scale patient set
06/30/16Prompting subject matter experts for additional detail based on historical answer ratings
06/30/16Quantification based classifier
06/30/16Combinators
06/30/16Real-time shared web browsing among social network contacts
06/30/16Rapid searching and matching of data to a dynamic set of signatures facilitating parallel processing and hardware acceleration
06/30/16Defining reusable metrics for architectural optimization
06/30/16Phase algebra for specifying clocks and modes in hierarchical designs
06/30/16Implementing system irritator accelerator fpga unit (afu) residing behind a coherent attached processors interface (capi) unit
06/30/16Implementing system irritator accelerator fpga unit (afu) residing behind a coherent attached processors interface (capi) unit
06/30/16Phase algebra for virtual clock and mode extraction in hierarchical designs
06/30/16Technology for temperature sensitive components in thermal processing
06/30/16Hypothesis-driven, real-time analysis of physiological data streams using textual represnetations
06/30/16Biometric authentication
06/30/16Multi-level password authorization
06/30/16Application decomposition using data obtained from external tools for use in threat modeling
06/30/16Retention management in a facility with multiple trust zones and encryption based secure deletion
06/30/16Automatic image classification
06/30/16Personalized, automated receptionist
06/30/16Personalized, automated receptionist
06/30/16Attribute-based alert ranking for alert adjudication
06/30/16Displaying quality of question being asked a question answering system
06/30/16Nlp duration and duration range comparison methodology using similarity weighting
06/30/16Rating difficulty of questions
06/30/16Recognizing customers requiring assistance
06/30/16Product interoperability determination
06/30/16Modeling asset transfer flow relationships discovered in unstructured data
06/30/16Warning system for sub-optimal sensor settings
06/30/16Evaluating presentation data
06/30/16Erasing recorded data by utilizing read head and write head
06/30/16Implementing conformal coating composition for high current circuit applications
06/30/16Type iii-v and type iv semiconductor device formation
06/30/16Physical unclonable interconnect function array
06/30/16Method of patterning dopant films in high-k dielectrics in a soft mask integration scheme
06/30/16Integrated circuit bonding with interposer die
06/30/16Silicon-germanium fin formation
06/30/16Non-planar semiconductor device with aspect ratio trapping
06/30/16Stressed nanowire stack for field effect transistor
06/30/16Stressed nanowire stack for field effect transistor
06/30/16Doped zinc oxide as n+ layer for semiconductor devices
06/30/16Tapered gate oxide in ldmos devices
06/30/16Enriched, high mobility strained fin having bottom dielectric isolation
06/30/16Enriched, high mobility strained fin having bottom dielectric isolation
06/30/16Silicon germanium-on-insulator finfet
06/30/16Defect-free strain relaxed buffer layer
06/30/16Vertical gate all-around transistor
06/30/16Vertical slit transistor with optimized ac performance
06/30/16Charge carrier transport facilitated by strain
06/30/16Hetero-channel finfet
06/30/16Large area contacts for small transistors
06/30/16High-reliability, low-resistance contacts for nanoscale transistors
06/30/16Double synthetic antiferromagnet using rare earth metals and transition metals
06/30/16In-situ annealing to improve the tunneling magneto-resistance of magnetic tunnel junctions
06/30/16Double synthetic antiferromagnet using rare earth metals and transition metals
06/30/16In-situ annealing to improve the tunneling magneto-resistance of magnetic tunnel junctions
06/30/16Direct and compact chip to waveguide transition
06/30/16Direct and compact chip to waveguide transition
06/30/16Implementing clock receiver with low jitter and enhanced duty cycle
06/30/16Implementing clock receiver with low jitter and enhanced duty cycle
06/30/16Deployment criteria for unmanned aerial vehicles to improve cellular phone communications
06/30/16Storage and retrieval of dispersed storage network access information
06/30/16Carbon nanotube array for cryptographic key generation and protection
06/30/16Systems and methods for online purchases of integrated services
06/30/16Management infrastructure analysis for cloud migration
06/30/16Dynamically launching inter-dependent applications based on user behavior
06/30/16Relocating an embedded cloud for fast configuration of a cloud computing environment
06/30/16Optimized migration of virtual objects across environments in a cloud computing environment
06/30/16Management infrastructure analysis for cloud migration
06/30/16Optimizing cloud service delivery within a cloud computing environment
06/30/16Dynamically modifying quality of service levels for resources running in a networked computing environment
06/30/16Managing change in an information technology environment
06/30/16Cross-domain service request placement in a software defined environment (sde)
06/30/16Virtual machine network controller
06/30/16Data packet processing
06/30/16I/o driven rate adaptation
06/30/16System and method for unfiltering filtered status messages
06/30/16Automatic security parameter management and renewal
06/30/16Recording data and using the recorded data
06/30/16Consolidated authentication
06/30/16Captcha challenge incorporating obfuscated characters
06/30/16Authentication based on proximate devices
06/30/16Blocking intrusion attacks at an offending host
06/30/16Method and system for transmitting an application message between nodes of a clustered data processing system
06/30/16Mobile device workload management for cloud computing using sip and presence to control workload and method thereof
06/30/16Relocating an embedded cloud for fast configuration of a cloud computing environment
06/30/16Content caching with remote charging services in a radio access network
06/30/16Monitoring voice over internet protocol (voip) quality during an ongoing call
06/30/16Notification to users of events
06/30/16Adaptive monitoring for cellular networks
06/30/16Adaptive monitoring for cellular networks
06/30/16Configurable wireless switched network
06/30/16Monitoring and control device and method for an illumination apparatus
06/30/16Implementing conformal coating composition for high current circuit applications
06/30/16Modular elements employing latches with flexure bearings
06/30/16Modular elements employing latches secured by linkages
06/30/16Modular elements employing latches with flexure bearings
06/30/16Enhanced rack design to improve component and cable access
06/23/16Window opacity attenuation using microfluidic channels
06/23/16Intelligent thermostat control system
06/23/16Wafer to wafer alignment
06/23/16Measurements of an integrated circuit chip and connected chip carrier to estimate height of interconnect
06/23/16Measuring moisture leakage through liquid-carrying hardware
06/23/16Cartridge for storing biosample capillary tubes and use in automated data storage systems
06/23/16Capacitance monitoring using x-ray diffraction
06/23/16Electrical circuit odometer sensor array
06/23/16Identification of unknown sources for logic built-in self test in verification
06/23/16Detection and imaging of subsurface high impedance contrast objects
06/23/16Weather forecasting system and methods
06/23/16Window opacity attenuation using microfluidic channels
06/23/16Method and system for time synchronization among systems using parallel sysplex links
06/23/16Computer system component bay
06/23/16Design structure for reducing power consumption for memory device
06/23/16System for security conscious energy drain
06/23/16Event-driven reoptimization of logically-partitioned environment for power management
06/23/16Personalization of a web application
06/23/16Personalization of a web application
06/23/16Parameterized computed scrolling for navigation of structured data
06/23/16Scroll speed control for document display device
06/23/16Scroll speed control for document display device
06/23/16Preventing accidental selection events on a touch screen
06/23/16Self-organizing neural network approach to the automatic layout of business process diagrams
06/23/16Parameterized computed scrolling for navigation of structured data
06/23/16Modeling workload information for a primary storage and a secondary storage
06/23/16Cooperative data deduplication in a solid state storage array
06/23/16Method to improve page out mechanism with compressed memory pools
06/23/16Two-level hierarchical log structured array architecture using coordinated garbage collection for flash arrays
06/23/16Method to improve page out mechanism with compressed memory pools
06/23/16Data storage resource assignment
06/23/16Two-level hierarchical log structured array architecture with minimized write amplification
06/23/16Endurance enhancement scheme using memory re-evaluation
06/23/16Checkpointing module and method for storing checkpoints
06/23/16De-duplication as part of other routinely performed processes
06/23/16Using voice-based web navigation to conserve cellular data
06/23/16Checksum adder
06/23/16Minimizing processing load when solving maximum satisfiability problem
06/23/16Managed assertions in an integrated development environment
06/23/16Optimizing program performance with assertion management
06/23/16Assertion management in an integrated development environment
06/23/16Compiler method for generating instructions for vector operations on a multi-endian processor
06/23/16Optimizing if statements in computer programming
06/23/16Controlling execution of binary code
06/23/16Calculating confidence values for source code based on availability of experts
06/23/16Optimizing program performance with assertion management
06/23/16Assertions based on recently changed code
06/23/16Assertions based on recently changed code
06/23/16Parallel development of a software system
06/23/16Parallel development of a software system
06/23/16Identifying equivalent javascript events
06/23/16Server-side translation for custom application support in client-side scripts
06/23/16Non-serialized push instruction for pushing a message payload from a sending thread to a receiving thread
06/23/16Non-serialized push instruction for pushing a message payload from a sending thread to a receiving thread
06/23/16Compiler method for generating instructions for vector operations on a multi-endian processor
06/23/16Compiler method for generating instructions for vector operations in a multi-endian instruction set
06/23/16Compiler method for generating instructions for vector operations in a multi-endian instruction set
06/23/16Instruction set architecture with opcode lookup using memory attribute
06/23/16Pipelining out-of-order instructions
06/23/16Emulated device firmware testable by native operating system tools
06/23/16Exiting multiple threads of a simulation environment in a computer
06/23/16Automated exploitation of virtual machine resource modifications
06/23/16Generating a deployment pattern for reuse in a networked computing environment
06/23/16Multiple stage workload management system
06/23/16Efficient validation of resource access consistency for a set of virtual devices
06/23/16Event-driven reoptimization of logically-partitioned environment for power management
06/23/16Addressing for inter-thread push communication
06/23/16Push instruction for pushing a message payload from a sending thread to a receiving thread
06/23/16Addressing for inter-thread push communication
06/23/16Push instruction for pushing a message payload from a sending thread to a receiving thread
06/23/16Workload-adaptive data packing algorithm
06/23/16Read-detection in multi-level cell memory
06/23/16Energy conscious mobile device redundancy and recovery
06/23/16Energy conscious mobile device redundancy and recovery
06/23/16Data asset reconstruction
06/23/16Recovery of local resource
06/23/16Design structure for reducing power consumption for memory device
06/23/16Cluster creation and management for workload recovery
06/23/16Selectively coupling a pci host bridge to multiple pci communication paths
06/23/16System for security conscious energy drain
06/23/16Elapsed time indications for source code in development environment
06/23/16Auto-deployment and testing of system application test cases in remote server environments
06/23/16Techniques for automatically generating testcases
06/23/16Monitoring and capturing early diagnostic data
06/23/16Page-level health equalization
06/23/16Method, apparatus and computer programs providing cluster-wide page management
06/23/16Mirroring a cache having a modified cache state
06/23/16Mirroring a cache having a modified cache state
06/23/16Non-volatile memory controller cache architecture with support for separation of data streams
06/23/16Instruction set architecture with opcode lookup using memory attribute
06/23/16Tracking memory accesses when invalidating effective address to real address translations
06/23/16Tracking memory accesses when invalidating effective address to real address translations
06/23/16Processing element data sharing
06/23/16Categorizing memory pages based on page residences
06/23/16Device table in system memory
06/23/16Using voice-based web navigation to conserve cellular data
06/23/16Parallelizing semantically split documents for processing
06/23/16Persona based content modification
06/23/16Orthographic error correction using phonetic transcription
06/23/16Parallelizing semantically split documents for processing
06/23/16System and method for read-ahead enhancements
06/23/16Domain-specific computational lexicon formation
06/23/16Domain-specific computational lexicon formation
06/23/16Validating topical data
06/23/16Responding to data requests related to constrained natural language vocabulary terms
06/23/16Diagnosing autism spectrum disorder using natural language processing
06/23/16Validating topical data
06/23/16Crawling computer-based objects
06/23/16Revision management
06/23/16Calculating expertise confidence based on content and social proximity
06/23/16Calculating expertise confidence based on content and social proximity
06/23/16Scoring attributes in deep question answering systems based on algorithmic source code influences
06/23/16Calculating confidence values for source code based on availability of experts
06/23/16Processing event log data
06/23/16Smart archiving of real-time performance monitoring data
06/23/16Isolation anomaly quantification through heuristical pattern detection
06/23/16Revision management
06/23/16Defining pairing rules for connections
06/23/16Smart archiving of real-time performance monitoring data
06/23/16Database joins using uncertain criteria
06/23/16Optimization of metadata via lossy compression
06/23/16Wall encoding and decoding
06/23/16Utilizing hyperlink forward chain analysis to signify relevant links to a user
06/23/16Scoring attributes in deep question answering systems based on algorithmic source code influences
06/23/16Reliability improvement of distributed transaction processing optimizations based on connection status
06/23/16Optimizing continuous query operations in an in memory data grid (imdg)
06/23/16System and method for determining whether files are appropriate for addition into a collection
06/23/16Optimizing continuous query operations in an in memory data grid (imdg)
06/23/16Database joins using uncertain criteria
06/23/16Optimization of metadata via lossy compression
06/23/16Managing answer feasibility
06/23/16Creating and discovering learning content in a social learning system
06/23/16Integrating and searching electronic communications received from a plurality of different communication platforms
06/23/16Asynchronous data replication using an external buffer table
06/23/16Asynchronous data replication using an external buffer table
06/23/16Persona based content modification
06/23/16Categorizing users based on similarity of posed questions, answers and supporting evidence
06/23/16Classifying uniform resource locators
06/23/16Techniques for modifying recipes to reduce preparation times and/or incorporate preferred ingredients
06/23/16Scoring attributes in a deep question answering system based on syntactic or semantic guidelines
06/23/16Using paraphrase metrics for answering questions
06/23/16Responding to data requests related to constrained natural language vocabulary terms
06/23/16Scoring attributes in a deep question answering system based on syntactic or semantic guidelines
06/23/16Application multi-versioning in a traditional language environment
06/23/16Utilizing hyperlink forward chain analysis to signify relevant links to a user
06/23/16Optimizing web crawling through web page pruning
06/23/16Acquisition and transfer of tacit knowledge
06/23/16Information propagation via weighted semantic and social graphs
06/23/16Control for persistent search results and iterative searching
06/23/16Undo and redo of content specific operations
06/23/16System, method, and program for aggregating data
06/23/16Colocation and anticolocation in colocation data centers via elastic nets
06/23/16Non-invasive insertion of logic functions into a register-transfer level ('rtl') design
06/23/16Dividing lithography exposure fields to improve semiconductor fabrication
06/23/16Implementing enhanced performance dynamic evaluation circuit by combining precharge and delayed keeper
06/23/16Implementing enhanced performance dynamic evaluation circuit by combining precharge and delayed keeper
06/23/16Enhancing integrated circuit noise performance
06/23/16Hardware management and reconstruction using visual graphics
06/23/16Diagnosing autism spectrum disorder using natural language processing
06/23/16Unlocking electronic devices using touchscreen input gestures
06/23/16Composite propensity profile detector
06/23/16Analysis of scripts
06/23/16Static analysis based on abstract program representations
06/23/16Using a local authorization extension to provide access authorization for a module to access a computing system
06/23/16Electronic data security apparatus
06/23/16Creating mechanical stamps to produce machine-readable optical labels
06/23/16Object popularity detection
06/23/16Image processing
06/23/16Creating mechanical stamps to produce machine-readable optical labels
06/23/16Techniques for answering user questions based on user expertise level
06/23/16Automated opinion prediction based on indirect information
06/23/16Automated opinion prediction based on indirect information
06/23/16Tailored supporting evidence
06/23/16Object popularity detection
06/23/16Pattern based behavior model for system management
06/23/16Pattern based behavior model for system management
06/23/16Avoidance of supporting evidence processing based on key attribute predictors
06/23/16Managing a question and answer system
06/23/16Expanding training questions through contextualizing feature search
06/23/16Avoiding supporting evidence processing when evidence scoring does not affect final ranking of a candidate answer
06/23/16Avoiding supporting evidence processing when evidence scoring does not affect final ranking of a candidate answer
06/23/16Processing apparatus, processing method, estimating apparatus, estimating method, and program
06/23/16Evaluation solutions of optimization problems
06/23/16Iterative refinement of pathways correlated with outcomes
06/23/16Self-organizing neural network approach to the automatic layout of business process diagrams
06/23/16Generating a visitation schedule
06/23/16Network system and method for transferring cryptocurrencies between a user account and a receiving account
06/23/16Estimation model for estimating an attribute of an unknown target
06/23/16Interactive visual storage capacity forecasting
06/23/16Media consumer viewing and listening behavior
06/23/16Managing customer interactions with a product being presented at a physical location
06/23/16Video tracker having digital signal processor
06/23/16Selectively pairing an application presented in virtual space with a physical display
06/23/16Selectively pairing an application presented in virtual space with a physical display
06/23/16Identification display
06/23/16Self-service crossing aid for pedestrians
06/23/16Self-service crossing aid for pedestrians
06/23/16Managing a question and answer system
06/23/16Managing answer feasibility
06/23/16Creating and discovering learning content in a social learning system
06/23/16Evaluating expert opinions in a question and answer system
06/23/16Coaching a participant in a conversation
06/23/16Coaching a participant in a conversation
06/23/16Method for improving acoustic model, computer for improving acoustic model and computer program thereof
06/23/16Converting data between users during a data exchange session
06/23/16Tape head assembly for linear tape open
06/23/16Implementing dram row hammer avoidance
06/23/16Implementing dram row hammer avoidance
06/23/16Sensing circuit for a non-volatile memory cell having two complementary memory transistors
06/23/16Non-volatile memory sense circuit
06/23/16Implementing hidden security key in efuses
06/23/16Implementing hidden security key in efuses
06/23/16Integrated photoemission sources and scalable photoemission structures
06/23/16Method for manufacturing interconnect structures incorporating air gap spacers
06/23/16Titanium tungsten liner used with copper interconnects
06/23/16Integrated circuit barrierless microfluidic channel
06/23/16Gate-all-around fin device
06/23/16Fin formation on an insulating layer
06/23/16Method of fine-tuning process controls during integrated circuit chip manufacturing based on substrate backside roughness
06/23/16Integrated circuit barrierless microfluidic channel
06/23/16Integrated circuit cooling apparatus
06/23/16Subtractive etch interconnects
06/23/16Three-dimensional integrated circuit integration
06/23/16Multi-layered integrated circuit with selective temperature coefficient of resistance
06/23/16Field-isolated bulk finfet
06/23/16Cmos transistors including gate spacers of the same thickness
06/23/16Semiconductor structures with deep trench capacitor and methods of manufacture
06/23/16Finfet based zram with convex channel region
06/23/16Semiconductor structures with deep trench capacitor and methods of manufacture
06/23/16Low-drive current finfet structure for improving circuit density of ratioed logic in sram devices
06/23/16Low-drive current finfet structure for improving circuit density of ratioed logic in sram devices
06/23/16Multi-orientation soi substrates for co-integration of different conductivity type semiconductor devices
06/23/16Multiple vt in iii-v fets
06/23/16Capacitor structure compatible with nanowire cmos
06/23/16Trench metal-insulator-metal capacitor with oxygen gettering layer
06/23/16Formation of finfet junction
06/23/16Trench epitaxial growth for a finfet device having reduced capacitance
06/23/16Reduced trench profile for a gate
06/23/16Semiconductor devices having low contact resistance and low current leakage
06/23/16Partial spacer for increasing self aligned contact process margins
06/23/16Iii-v mosfets with halo-doped bottom barrier layer
06/23/16Finfet device having a high germanium content fin structure and method of making same
06/23/16Method to improve reliability of high-k metal gate stacks
06/23/16Silicon photonics integration method and structure
06/23/16Electrostatic discharge power clamp with fail-safe design
06/23/16Regulation for multi-phase voltage pump system
06/23/16Implementing adaptive control for optimization of pulsed resonant drivers
06/23/16Implementing adaptive control for optimization of pulsed resonant drivers
06/23/16Level-shifting latch
06/23/16Level-shifting latch
06/23/16Path encoding and decoding
06/23/16Computing element allocation in data receiving link
06/23/16Phase interpolator calibration
06/23/16Hash value capable of generating one or more hash functions
06/23/16Reliability improvement of distributed transaction processing optimizations based on connection status
06/23/16Dynamic boundary based monitoring and metering
06/23/16Integrated metering of service usage for hybrid clouds
06/23/16Maximizing storage controller bandwidth utilization in heterogeneous storage area networks
06/23/16Network performance testing in non-homogeneous networks
06/23/16Local session loopback protocol
06/23/16Overlay capabilities exchange using dcbx
06/23/16Connection pool management
06/23/16Conversation advisor
06/23/16E-mail inbox assistant to reduce context switching
06/23/16System, method and computer program product to extract information from email communications
06/23/16Social network activity modes
06/23/16Policy-based delayed dispatch of e-mail messages
06/23/16E-mail inbox assistant to reduce context switching
06/23/16Policy-based delayed dispatch of e-mail messages
06/23/16Method and apparatus for threat isolation and remote resolution for computer systems
06/23/16Process security validation
06/23/16Auto-tuning program analysis tools based on user feedback
06/23/16Multi-dimensional geometry for enhancement of simulations of network devices
06/23/16Multi-dimensional geometry for enhancement of simulations of network devices
06/23/16Auto-tuning program analysis tools using machine learning
06/23/16Local session loopback protocol
06/23/16Dynamic profile sharing using expiring tokens
06/23/16Remedying distortions in speech audios received by participants in conference calls using voice over internet protocol (voip)
06/23/16Conforming distributed posts to reflect social networking web site environments and audiences
06/23/16Data repository for a distributed processing environment
06/23/16Peer-to-peer networking through universal port connections
06/23/16Workload deployment with real-time consideration of global network congestion
06/23/16Synchronization of components in heterogeneous systems
06/23/16Data replication across servers
06/23/16Application multi-versioning in a traditional language environment
06/23/16Intelligently detecting the leader of a co-browsing session
06/23/16Disconnect protection for command-line remote terminals
06/23/16Moving critical actions within a mobile application
06/23/16Acquisition and transfer of tacit knowledge
06/23/16Mobile phone call handling
06/23/16Network performance testing in non-homogeneous networks
06/23/16Using an integrated services for digital network message header to convey a battery state
06/23/16Patterned metallization handle layer for controlled spalling
06/23/16Patterned metallization handle layer for controlled spalling
06/23/16Modular enclosure elements employing cams forming detent features with latches
06/23/16Modular enclosure elements employing cams forming detent features with latches
06/23/16Cold air containment system in a data centre
06/16/16Design structure for metal oxide semiconductor capacitor
06/16/16Segmented variable rate drip irrigation
06/16/16Detecting visual impairment through normal use of a mobile device
06/16/16Method and system of making digital image transfer thermoformed objects
06/16/16Mitigating driver fatigue
06/16/16Microfluidic surface processing device and method
06/16/16Protective cover assembly for air-moving assembly
06/16/16Access route optimization for harvestable resources
06/16/16Access route optimization for harvestable resources
06/16/16