Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

International Business Machines Company patents


Recent patent applications related to International Business Machines Company. International Business Machines Company is listed as an Agent/Assignee. Note: International Business Machines Company may have other listings under different names/spellings. We're not affiliated with International Business Machines Company, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machines Company-related inventors


Paired smart device theft deterrent

A request to pair a first device with a second device is received. An indication is sent from the second device to the first device. ... International Business Machines Company

Security of shared credentials in crowdsourced wireless networks

A method, system and computer program product are disclosed for sharing a crowd sourced wireless network, wherein a first user uses a first device to access a wireless network, and the first device includes an application to grant automatically access to the wireless network to all of a defined group of people. In an embodiment, the method comprises restricting the automatic grant of access to the wireless network by, when one person of said group of people requests access to the network, a network control obtaining a determined strength of a defined relationship between the first user and that person, and granting the person access to the wireless network only if the determined strength of the defined relationship meets one or more set criteria. ... International Business Machines Company

Utilizing caller wait time to create social message

A method, system and computer program product for utilizing a caller wait time. When the caller's estimated wait time exceeds a threshold amount of time, an interactive voice response (ivr) system retrieves information (e.g., caller's previous purchases) about the caller. ... International Business Machines Company

End user experience via distributed option tree generation

A method, computer program product, and system is disclosed for generating an interactive voice response (ivr) system tree. A plurality of ivr system options from the ivr system are received. ... International Business Machines Company

End user experience via distributed option tree generation

A method, computer program product, and system is disclosed for generating an interactive voice response (ivr) system tree. A plurality of ivr system options from the ivr system are received. ... International Business Machines Company

Establishing cross-vendor secure connectivity in a shared computing environment

A method, computer program product, and a device for establishing a direct communications connection between gateways of two computing systems includes a processor(s) of a first system receiving configuration instructions in a generic format and translating the configuration instructions into a first set of gateway configuration commands that are in a format compatible with a first gateway of the first system. The processor(s) executes the first set to configure the first gateway. ... International Business Machines Company

Blockchain-enhanced mobile telecommunication device

A computer-implemented method tracks and maintains a record of telecommunication device events using a blockchain that is supported by a peer-to-peer network. One or more processors detect one or more events at a telecommunication device, and then transmit a transaction of the one or more events from the telecommunication device to multiple remote computing devices that are part of a peer-to-peer network, which supports a blockchain that includes a block that includes the transaction of the one or more events.. ... International Business Machines Company

Distributed resource allocation in a federated cloud environment

Status information associated with a set of cloud servers is received. Each cloud server in the set has an associated cloud agent, and the status information includes available computing resources and associated resource compensation information. ... International Business Machines Company

Blockchain web browser interface

A computer-implemented method records and maintains a record of browser events in a blockchain using a peer-to-peer network. One or more processors detect one or more browser events for a browser on a computer. ... International Business Machines Company

Creating a multi-dimensional host fingerprint for optimizing reputation for ipv6

A mechanism is provided for blocking ip connection addresses and prefixes. Header information is extracted from an incoming connection request. ... International Business Machines Company

Technology for generating a multi-user response in a network

In a computer system implemented method for generating an authorized response to a message in a network, the computer system detects a message sent by an originator via a network. The computer system selects a group of users to contribute to the authorized response to the message based on the computer system analyzing the message. ... International Business Machines Company

Technology for generating a multi-user response in a network

In a computer system implemented method for generating an authorized response to a message in a network, the computer system detects a message sent by an originator via a network. The computer system selects a group of users to contribute to the authorized response to the message based on the computer system analyzing the message. ... International Business Machines Company

Anonymizing biometric data for use in a security system

An anonymized biometric representation of a target individual is used in a computer based security system. The system receives a record of a target individual containing a weakened biometric representation of a detailed biometric signal of the target individual. ... International Business Machines Company

Self management of credentials by iot devices

A method, a device and a computer program product are provided. A networked device determines whether a condition occurred. ... International Business Machines Company

09/06/18 / #20180255034

System and method for encrypted document co-editing

A computer-implemented method, computer program product, and computing system is provided for encrypted document co-editing. In an implementation, a method may include receiving, at a first computing device, a first encrypted change set for a co-editable data object from a client, the first encrypted change set being encrypted by a first key. ... International Business Machines Company

09/06/18 / #20180255016

Suggesting a message to user to post on a social network based on prior posts directed to same topic in a different tense

A method, system and computer program product for improving the quality of the posts in a social network. A topic of a post to a social network environment is identified using natural language processing. ... International Business Machines Company

09/06/18 / #20180255014

Managing message notifications in a computing environment

A tool for managing message notifications in a computing environment includes a computer determining a user receives a notification of a first message received in a collaboration application on a computing device of the user, and determining a topic for the first message. The computer then determines whether the user suppresses the notification of the first message by determining whether a gesture received from the user corresponds to a gesture map stored for the collaboration application, and if so, the computer stores the topic for the first message associated with an indication the user suppressed the notification. ... International Business Machines Company

09/06/18 / #20180255013

Managing message notifications in a computing environment

A tool for managing message notifications in a computing environment includes a computer determining a user receives a notification of a first message received in a collaboration application on a computing device of the user, and determining a topic for the first message. The computer then determines whether the user suppresses the notification of the first message, and if so, the computer stores the topic for the first message associated with an indication the user suppressed the notification for the collaboration application. ... International Business Machines Company

09/06/18 / #20180254996

Automatic scaling of microservices based on projected demand

The system, method, and computer program product described herein provide automatic scaling of resources allocated to microservices based on projected demand data received from consumers of the microservices. In an aspect of the present disclosure, a method for scaling up or down a capacity allocated to a microservice is disclosed. ... International Business Machines Company

09/06/18 / #20180254995

System and method for distributing resources throughout a network

The present invention provides a method and system for distributing resources for operating applications within a network by determining a composite resource consumption of the network of resources distributed throughout the network, and determining minimum, maximum and average values of each of the resources required to operate the applications. When an application is introduced into, or removed from, the network, then a change in the composite resource consumption of the network is determined and a software patch is generated to adjust resource distribution throughout the network so that resource allocation to active applications is normalized for optimal operation.. ... International Business Machines Company

09/06/18 / #20180254984

Packet forwarding for quality of service delivery

Embodiments of the present invention include methods, systems, and computer program products for packet forwarding. Aspects of the invention include receiving, from a source node, a first network queue in a set of network queues, wherein the first network queue includes one or more minimum network traffic performance requirements. ... International Business Machines Company

09/06/18 / #20180254983

Packet forwarding for quality of service delivery

Embodiments of the present invention include methods, systems, and computer program products for packet forwarding. Aspects of the invention include receiving, from a source node, a first network queue in a set of network queues, wherein the first network queue includes one or more minimum network traffic performance requirements. ... International Business Machines Company

09/06/18 / #20180254967

Interactive personal digital assistant device

A personal digital assistant device includes: a memory storing an interactive personal digital assistant program and a processor configured to execute the interactive personal digital assistant program. The interactive personal digital assistant program performs an operation to determine whether the service provider is automated or is not automated. ... International Business Machines Company

09/06/18 / #20180254963

Debugging device with serial and ethernet console module and hardware bypass

A method is provided that includes accessing, by a debugging device associated with an external user device, (i) a serial console of a hardware network device, and (ii) a management ethernet port of the hardware network device. The method includes providing, by the debugging device, (i) a serial console interface from the serial console of the hardware network device to the external user device, and (ii) a management ethernet interface from the management ethernet port of the hardware network device to the external user device. ... International Business Machines Company

09/06/18 / #20180254961

Learned response for alerts

In a method for providing an automatic learned response in a network, a collection system observes user responses to the incoming system indicators and to parameter types and associated parameter values used in the user responses. The collection system creates alert event entries to includes the incoming system indicators, confidence thresholds, the user responses, and the parameter types and associated parameter values used in the user responses. ... International Business Machines Company

09/06/18 / #20180254952

Software implementation of network switch/router

A network switching system and method and a computer program product for operating a network switch are disclosed. The network switch includes a multitude of input ports and a multitude of output ports. ... International Business Machines Company

09/06/18 / #20180254914

Offensive action management

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement an offensive action management system for acting on offensive messages in a communication platform. A message monitoring component of the offensive action management system monitors messages posted to the communication platform. ... International Business Machines Company

09/06/18 / #20180254913

Offensive action management

A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions executed by the at least one processor to cause the at least one processor to implement an offensive action management system for acting on offensive messages in a communication platform. A message monitoring component of the offensive action management system monitors messages posted to the communication platform. ... International Business Machines Company

09/06/18 / #20180254908

Production of cryptographic signatures

A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce. ... International Business Machines Company

09/06/18 / #20180254894

Key exchange process

Embodiments are directed to a computer-implemented method and system for generating a transport key. A method can include generating, using a processor, a key agreement pair comprising a public agreement key and a private agreement key in a second element. ... International Business Machines Company

09/06/18 / #20180254890

Generating public/private key pairs to deploy public keys at computing devices to verify digital signatures

Provided are a computer program product, system, and method for generating public/private key pairs to deploy public keys at computing devices to verify digital signatures. A plurality of public-private key pairs are generated to store in a key store. ... International Business Machines Company

09/06/18 / #20180254889

Using public keys provided by an authentication server to verify digital signatures

Provided are a computer program product, system, and method for using public keys provided by an authentication server to verify digital signatures. A plurality of public keys from a plurality of public-private key pairs and stored in a local key store. ... International Business Machines Company

09/06/18 / #20180254784

Asserting integrity with a verifiable codec

A method includes retrieving a decode threshold number of encoded data slices, wherein codecs process, in an order, a data segment and the processed data segment is encoded into a set of encoded data slices. The method further includes decoding the decode threshold number of encoded data slices to recover the processed data segment. ... International Business Machines Company

09/06/18 / #20180254761

Switchable filters and design structures

Switchable and/or tunable filters, methods of manufacture and design structures are disclosed herein. The method of forming the filters includes forming at least one piezoelectric filter structure comprising a plurality of electrodes formed to be in contact with at least one piezoelectric substrate. ... International Business Machines Company

09/06/18 / #20180254411

Combined cmp and rie contact scheme for mram applications

A method is presented for establishing a top contact to a magnetic tunnel junction (mtj) device, the method including selectively etching, via a first etching process, an oxide layer to expose a top surface of a nitride layer of a dummy fill shape and selectively etching, via a second etching process, a top portion of the nitride layer of the dummy fill shape to expose a top surface thereof. The method further includes selectively etching, via the second etching process, the oxide layer to expose a top surface of a nitride layer of the mtj device, and selectively etching, via the first etching process, a top portion of the nitride layer of the mtj device to expose a top surface thereof such that a height of the mtj device is approximately equal to a height of the dummy fill shape.. ... International Business Machines Company

09/06/18 / #20180254410

Combined cmp and rie contact scheme for mram applications

A method is presented for establishing a top contact to a magnetic tunnel junction (mtj) device, the method including selectively etching, via a first etching process, an oxide layer to expose a top surface of a nitride layer of a dummy fill shape and selectively etching, via a second etching process, a top portion of the nitride layer of the dummy fill shape to expose a top surface thereof. The method further includes selectively etching, via the second etching process, the oxide layer to expose a top surface of a nitride layer of the mtj device, and selectively etching, via the first etching process, a top portion of the nitride layer of the mtj device to expose a top surface thereof such that a height of the mtj device is approximately equal to a height of the dummy fill shape.. ... International Business Machines Company

09/06/18 / #20180254395

Magnetically guided chiplet displacement

Magnetic regions of at least one of chiplet or a receiving substrate are used to permit magnetically guided precision placement of chiplets on the receiving substrate. In some embodiments, a scanning magnetic head can be used to release individual chiplets from a temporary support substrate to the receiving substrate. ... International Business Machines Company

09/06/18 / #20180254374

Photodiode structures

Photodiode structures and methods of manufacture are disclosed. The method includes forming a waveguide structure in a dielectric layer. ... International Business Machines Company

09/06/18 / #20180254361

Embedded junction in hetero-structured back-surface field for photovoltaic devices

A photovoltaic device and method include a crystalline substrate and an emitter contact portion formed in contact with the substrate. A back-surface-field junction includes a homogeneous junction layer formed in contact with the crystalline substrate and having a same conductivity type and a higher active doping density than that of the substrate. ... International Business Machines Company

09/06/18 / #20180254345

Strained semiconductor nanowire

At least one semiconductor nanowire laterally abutted by a pair of semiconductor pad portions is formed over an insulator layer. Portions of the insulator layer are etched from underneath the at least one semiconductor nanowire such that the at least one semiconductor nanowire is suspended. ... International Business Machines Company

09/06/18 / #20180254344

Vertical transistor with reduced gate-induced-drain-leakage current

A method of forming a vertical transport fin field effect transistor, including, forming a bottom source/drain layer at the surface of the substrate, forming one or more channels on the bottom source/drain layer, where the channels extend away from the bottom source/drain layer, forming a gate structure on each of the one or more channels, and forming a top source/drain segment on the top surface of each of the one or more channels, wherein either each of the top source/drain segments or the bottom source/drain layer has a larger bandgap than the other of the bottom source/drain layer or each of the top source/drain segments.. . ... International Business Machines Company

09/06/18 / #20180254333

Forming a fin using double trench epitaxy

The present invention relates generally to semiconductor devices and more particularly, to a structure and method of forming a fin using double trench epitaxy. The fin may be composed of a iii-v semiconductor material and may be grown on a silicon, silicon germanium, or germanium substrate. ... International Business Machines Company

09/06/18 / #20180254330

Replacement metal gate scheme with self-alignment gate for vertical field effect transistors

A method is presented for forming a semiconductor structure. The method includes forming a fin structure over a substrate, forming a dummy gate over the fin structure, and etching the dummy gate by a first amount to expose a top portion of the fin structure. ... International Business Machines Company

09/06/18 / #20180254329

Nanosheet mosfet with partial release and source/drain epitaxy

A method is presented for forming a nanosheet metal oxide semiconductor field effect transistor (mosfet) structure. The method includes forming a heteroepitaxial film stack including at least one sacrificial layer and at least one channel layer, patterning the heteroepitaxial film stack, forming a dummy gate stack with sidewall spacers, and forming a cladded or embedded epitaxial source/drain material along the patterned heteroepitaxial film stack sidewalls. ... International Business Machines Company

09/06/18 / #20180254322

Forming nanosheet transistors with differing characteristics

A method of forming a transistor in an integrated circuit device can include forming a first and second nanosheet structure with alternating sheets of silicon and silicon germanium. A first and second transistor structure are constructed using the first and second nanosheet structures as first and second channels. ... International Business Machines Company

09/06/18 / #20180254319

Fabrication of semiconductor junctions

Methods are provided for fabricating a semiconductor junction. A first semiconductor structure is selectively grown in a nanotube, which extends laterally over a substrate, from a seed extending within the nanotube. ... International Business Machines Company

09/06/18 / #20180254275

Spacer for trench epitaxial structures

The disclosure relates to a structure and methods of forming spacers for trench epitaxial structures. The method includes: forming a spacer material between source and drain regions of respective first-type gate structures and second-type gate structures; growing source and drain material about the first-type gate structures, confined within an area defined by the spacer material; and growing source and drain material about the second-type gate structures, confined within an area defined by the spacer material.. ... International Business Machines Company

09/06/18 / #20180254274

Spacer for trench epitaxial structures

The disclosure relates to a structure and methods of forming spacers for trench epitaxial structures. The method includes: forming a spacer material between source and drain regions of respective first-type gate structures and second-type gate structures; growing source and drain material about the first-type gate structures, confined within an area defined by the spacer material; and growing source and drain material about the second-type gate structures, confined within an area defined by the spacer material.. ... International Business Machines Company

09/06/18 / #20180254273

Finfet with uniform shallow trench isolation recess

Disclosed herein are processes and structures for uniform sti recessing. A method of making a semiconductor device includes initially forming a dense region of at least two fins on a substrate. ... International Business Machines Company

09/06/18 / #20180254242

Enhanced self-alignment of vias for a semiconductor device

A method of forming a self-aligned pattern of vias in a semiconductor device comprises etching a pattern of lines that contain notches that are narrower than other parts of the line. Thereafter, vias are created where the notches are located. ... International Business Machines Company

09/06/18 / #20180254220

Trench gate first cmos

After forming an interlevel dielectric (ild) layer over a semiconductor material portion located on a substrate, a gate trench is formed extending through the ild layer to expose a channel region of the semiconductor material portion. A gate structure is then formed within the gate trench. ... International Business Machines Company

09/06/18 / #20180254218

Integrating metal-insulator-metal capacitors with fabrication of vertical field effect transistors

Device and methods are provided for fabricating semiconductor devices in which metal-insulator-metal (mim) capacitor devices are integrally formed with vertical field effect transistor (fet) devices. For example, a semiconductor device includes first and second vertical fet devices, and a capacitor device, formed in different device regions of a substrate. ... International Business Machines Company

09/06/18 / #20180254083

Resistive memory apparatus using variable-resistance channels with high- and low-resistance regions

Apparatus including: memory cell unit(s) having a variable-resistance channel component (cc) extending between first and second supply terminals for supplying read and write (r/w) signals to the unit in respective r/w modes, and resistive memory elements (rmes) arranged along the cc, rme includes resistive memory material (rmm), extending along a respective channel segment (chs) of the cc in contact therewith, in which respective lengths along that chs of high- and low-resistance regions is variable in write mode, and a gate terminal provided on that chs for controlling resistance of the chs in response to control signal(s) (cs) applied to the gate terminal; and circuitry configured to apply the cs such that, in read mode, a rme(s) is selected by applying a cs producing chs with resistance between the resistance regions of the rmm; and remaining rme(s) are deselected by applying cs producing chs having resistance less than the low-resistance region.. . ... International Business Machines Company

09/06/18 / #20180254069

Correlation of recorded video presentations and associated slides

Techniques are disclosed for performing a computer-implemented processing of slide presentation videos to automatically generate index locations corresponding to particular slides within a slide presentation video. In embodiments, a slide presentation video is uploaded to a video processing system. ... International Business Machines Company

09/06/18 / #20180254060

Magnetic recording head having longitudinally spaced offset arrays

An apparatus according to one embodiment includes a head having at least two modules, each of the modules having an array of transducers and at least one servo transducer. An axis of each array is defined between opposite ends thereof. ... International Business Machines Company

09/06/18 / #20180254051

Role modeling in call centers and work centers

Embodiments of the invention include method, systems and computer program products for role modeling. Aspects of the invention include receiving, by a processor, audio data, wherein the audio data includes a plurality of audio conversation for one or more speakers. ... International Business Machines Company

09/06/18 / #20180253988

Learning of policy for selection of associative topic in dialog system

A computer-implemented method for learning a policy for selection of an associative topic, which can be used in a dialog system, is described. The method includes obtaining a policy base that indicates a topic transition from a source topic to a destination topic and a short-term reward for the topic transition, by analyzing data from a corpus. ... International Business Machines Company

09/06/18 / #20180253987

Learning of policy for selection of associative topic in dialog system

A computer-implemented method for learning a policy for selection of an associative topic, which can be used in a dialog system, is described. The method includes obtaining a policy base that indicates a topic transition from a source topic to a destination topic and a short-term reward for the topic transition, by analyzing data from a corpus. ... International Business Machines Company

09/06/18 / #20180253911

Transaction system supporting universal ticket solutions for transportation

An embodiment of the invention provides a system and method for a transaction system supporting universal ticket solutions for transportation. A fund managing device determines whether a first fund of an account of a user has sufficient credit to satisfy a transportation fee imposed by a first city. ... International Business Machines Company

09/06/18 / #20180253882

Generating a personal avatar and morphing the avatar in time

A virtual reality processor-based system and computer implemented method that morphs an individual's personal characteristics, including appearance, voice, speech behavior, movement behavior, physical agility and expressionable ideas, so that people can have a more realistic sensation as they move in the past and future. The personal avatar morphed to a time in the past is based on interpolating the personal characteristics information and the avatar morphed to a time in the future is based on extrapolating the personal characteristics information. ... International Business Machines Company

09/06/18 / #20180253833

Lens distortion correction using a neurosynaptic circuit

One or more embodiments provide method for image distortion correction including receiving, by multiple neurosynaptic core circuits, a set of inputs comprising image dimensions and pixel distortion coefficients for at least one image frame via at least one input core circuit. Each distorted pixel is mapped to zero or more undistorted pixels by processing the set of inputs corresponding to each pixel of the at least one image frame by the at least one input core circuit. ... International Business Machines Company

09/06/18 / #20180253825

Lens distortion correction using a neurosynaptic circuit

One or more embodiments provide a neurosynaptic circuit that includes multiple neurosynaptic core circuits that: perform image distortion correction by converting a source image to a destination image by: taking as input a sequence of image frames of a video with one or more channels per frame, and converting dimensions and pixel distortion coefficients of each frame as one or more corresponding neuronal firing events. Each distorted pixel is mapped to zero or more undistorted pixels by processing each neuronal firing event corresponding to each pixel of each image frame. ... International Business Machines Company

09/06/18 / #20180253818

Deep learning via dynamic root solvers

The present invention provides a computer implemented method, system, and computer program product of deep learning via dynamic root solvers. In an embodiment, the present invention includes (1) forming an initial set of gpus into an initial binary tree architecture, where the initial set includes initially idle gpus and an initial root solver gpu as the root of the initial binary tree architecture, (2) calculating initial gradients and initial adjusted weight data, (3) choosing a first currently idle gpu as a current root solver gpu, (4) forming a current set of gpus into a current binary tree architecture, where the current set includes the additional currently idle gpus and the current root solver gpu as the root of the current binary tree architecture, (5) calculating current gradients and current adjusted weight data, and (6) transmitting an initial update to the weight data to the available gpus.. ... International Business Machines Company

09/06/18 / #20180253817

Deep learning via dynamic root solvers

The present invention provides a computer implemented method, system, and computer program product of deep learning via dynamic root solvers. In an embodiment, the present invention includes (1) forming an initial set of gpus into an initial binary tree architecture, where the initial set includes initially idle gpus and an initial root solver gpu as the root of the initial binary tree architecture, (2) calculating initial gradients and initial adjusted weight data, (3) choosing a first currently idle gpu as a current root solver gpu, (4) forming a current set of gpus into a current binary tree architecture, where the current set includes the additional currently idle gpus and the current root solver gpu as the root of the current binary tree architecture, (5) calculating current gradients and current adjusted weight data, and (6) transmitting an initial update to the weight data to the available gpus.. ... International Business Machines Company

09/06/18 / #20180253816

Deep learning via dynamic root solvers

The present invention provides a computer implemented method, system, and computer program product of deep learning via dynamic root solvers. In an embodiment, the present invention includes (1) forming an initial set of gpus into an initial binary tree architecture, where the initial set includes initially idle gpus and an initial root solver gpu as the root of the initial binary tree architecture, (2) calculating initial gradients and initial adjusted weight data, (3) choosing a first currently idle gpu as a current root solver gpu, (4) forming a current set of gpus into a current binary tree architecture, where the current set includes the additional currently idle gpus and the current root solver gpu as the root of the current binary tree architecture, (5) calculating current gradients and current adjusted weight data, and (6) transmitting an initial update to the weight data to the available gpus.. ... International Business Machines Company

09/06/18 / #20180253814

System and method for incident validation and ranking using human and non-human data sources

Systems and associated methods are provided that aggregated data from a variety of sources, the data pertaining to an incident. The aggregated data is analyzed and the credibility of the incident report is determined. ... International Business Machines Company

09/06/18 / #20180253813

System and method for incident validation and ranking using human and non-human data sources

Systems and associated methods are provided that aggregated data from a variety of sources, the data pertaining to an incident. The aggregated data is analyzed and the credibility of the incident report is determined. ... International Business Machines Company

09/06/18 / #20180253766

Model trading in a device

A model trading method, system, and computer program product include extracting a feature-model list from a first application and a feature-model list from a second application on a device, creating a price model for a price for each feature-model of the feature-model list of the second application that matches a feature-model of the feature-model list for the first application, and facilitating feature-model trading between the first application and the second application based on the feature-model list and the price model.. . ... International Business Machines Company

09/06/18 / #20180253762

Cognitive method to select a service

Embodiments of the invention include method, systems and computer program products for selecting a service. Aspects include includes receiving, by a processor, customer data. ... International Business Machines Company

09/06/18 / #20180253737

Dynamicall evaluating fraud risk

A mechanism is provided for dynamically evaluating fraud risk. Responsive to receiving a notification, a set of indicators associated with a focal object are automatically analyzed to form a combined assessment. ... International Business Machines Company

09/06/18 / #20180253735

Program identifier response to unstructured input

A computer-implemented method for identifying a problem from unstructured input includes executing on a computer processor the step of identifying context of a problem description from a service support k ticket which adds one or more tags to the service support ticket, each tag corresponding to an end-user symptom within the problem domain. Intent is mapped according to a machine learning model and the one or more tags which identifies a problem and a confidence measure.. ... International Business Machines Company

09/06/18 / #20180253728

Optimizing fraud analytics selection

A computer-implemented method, system, and computer program product for optimizing analytics selection to detect fraud retrieves, from an electronic database, historical data on a plurality of available fraud detection analytics, the historical data including service times and risk levels associated with the fraud detection analytics, and analyzes the historical data to form a fraud detection analytics optimization model. A required service time for the transaction is determined based on information about the requester and the transaction, and the fraud detection analytics optimization model is used to select, from a plurality of available fraud detection analytics, a fraud detection analytic with a lowest risk level predicted to execute within the required service time. ... International Business Machines Company

09/06/18 / #20180253662

Embodied cognition platform

One embodiment provides an apparatus, including: a sensor subsystem comprising i) a plurality of sensors that collect information about the apparatus' immediate environment and ii) at least one agent that fuses and interprets the collected information; a model subsystem comprising i) a plurality of models, including a model for each of the apparatus' immediate environment, sentient beings, and the apparatus itself, the models receiving the collected information and storing other information and ii) at least one agent that uses the collected information and the stored other information to deduce information about the apparatus' immediate environment; an actuator subsystem comprising a plurality of actuators that interact with the apparatus' immediate environment based upon the collected information and the information deduced by the model subsystem; and an agency subsystem comprising a plurality of agents that carry out plans according to goals identifying at least one desired outcome in relation to the apparatus' immediate environment.. . ... International Business Machines Company

09/06/18 / #20180253653

Rich entities for knowledge bases

A computer program product, according to one embodiment, includes a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to: identify, by the processor, key concepts in a domain ontology, and use, by the processor, the key concepts to create a rich entity. Identifying the key concepts includes performing centrality analysis of concepts extracted from the domain ontology. ... International Business Machines Company

09/06/18 / #20180253646

Hybrid aggregation for deep learning neural networks

A processing unit topology of a neural network including a plurality of processing units is determined. The neural network includes at least one machine in which each machine includes a plurality of nodes, and wherein each node includes at least one of the plurality of processing units. ... International Business Machines Company

09/06/18 / #20180253645

Triage of training data for acceleration of large-scale machine learning

Triage of training data for acceleration of large-scale machine learning is provided. In various embodiments, training input from a set of training data is provided to an artificial neural network. ... International Business Machines Company

09/06/18 / #20180253642

Resistive processing unit with hysteretic updates for neural network training

A technique relates a resistive processing unit (rpu) array. A set of conductive column wires are configured to form cross-points at intersections between the set of conductive row wires and a set of conductive column wires. ... International Business Machines Company

09/06/18 / #20180253606

Crowd detection, analysis, and categorization

A method, computer system, and a computer program product for analyzing a crowd using a plurality of images captured by an aerial drone is provided. The present invention may include determining a geographic area associated with the crowd. ... International Business Machines Company

09/06/18 / #20180253605

Crowd detection, analysis, and categorization

A method, computer system, and a computer program product for analyzing a crowd using a plurality of images captured by an aerial drone is provided. The present invention may include determining a geographic area associated with the crowd. ... International Business Machines Company

09/06/18 / #20180253583

Recognizing fingerprints and fingerprint combinations as inputs

A method of inputting an action to a computer device using a fingerprint recognition sensor placed on a thumb of a user. The method including: setting a plurality of actions corresponding to fingerprint data from a user's fingerprint patterns; storing the plurality of actions corresponding to the fingerprint data in the computer device; reading fingerprint data by the fingerprint recognition sensor corresponding to the user's fingerprint patterns from a first finger placed in contact with the fingerprint recognition sensor; comparing the fingerprint pattern from the first finger with the user's fingerprint data stored in the computer device; and responsive to a match between the fingerprint pattern from the first finger and the user's fingerprint data stored in the computer device, initiating the action stored in the computer device corresponding to the first finger placed in contact with the fingerprint recognition sensor.. ... International Business Machines Company

09/06/18 / #20180253568

Analog-based multiple-bit chip security

A semiconductor device includes a plurality of transistors on a substrate, each transistor of the plurality of transistors including a doped nanowire channel region, where the plurality of transistors are grouped into a plurality of transistor groups each including two transistors of the plurality of transistors, and where each transistor group is assigned a state based on an electrical characteristic of each transistor in each transistor group. The semiconductor device also includes a security code for the plurality of transistors generated by grouping together the states corresponding to each transistor group.. ... International Business Machines Company

09/06/18 / #20180253562

Self-contained consistent data masking

Embodiments for performing self-contained, consistent data masking in a distributed computing environment by a processor. A data masking operation is performed on one or more datasets in one of a plurality of data formats such that a key of each value of each key-value pair representing a common set of columns or paths for the one or more datasets is masked.. ... International Business Machines Company

09/06/18 / #20180253560

Presenting a data instance based on presentation rules

For presenting a data instance based on data rules, a processor retrieves a data unique identifier from a data instance. The processor further identifies each person associated with the data instance. ... International Business Machines Company

09/06/18 / #20180253530

Cognitive stroke detection and notification

Embodiments of the invention include methods, systems, and computer program products for determining stroke onset. Aspects of the invention include determining a baseline behavioral model for a user and receiving real-time user data from a personal portable device. ... International Business Machines Company

09/06/18 / #20180253514

Capillary network simulations based on a low-dimensional representation of porous media

A method is provided including receiving data corresponding to a three-dimensional physical representation of a porous rock sample; calculating a low-dimensional representation of a pore network in the porous rock sample based on the three-dimensional physical representation; extracting one or more geometrical parameter from the low-dimension representation; generating a capillary network model of the porous rock sample based at least on the at least one geometrical parameter for simulating fluid flow inside the porous rock sample; and performing at least one simulation of a flow of the fluid through the capillary network model of the porous rock sample with a fluid additive to provide a predicted enhanced fluid recovery efficiency.. . ... International Business Machines Company

09/06/18 / #20180253487

Processing a help desk ticket

A method for processing a help desk ticket comprising a problem description is provided. The method includes receiving the ticket submitted by a user of a help desk system. ... International Business Machines Company

09/06/18 / #20180253476

Limiting tuple creation at the tuple level

An administrator may wish to limit the number of tuples that may be spawned as a result of a first tuple entering an operator graph. A first stream operator may receive a first tuple in order to perform an operation on the first tuple to generate a second tuple. ... International Business Machines Company

09/06/18 / #20180253472

Search performance using smart bitmap operations

A system creates a query name bitmap signature comprising at least one bigram for a query name. The system calculates a query name bitmap range for the query name based on a match threshold and a number of bigrams in the query name bitmap signature. ... International Business Machines Company

09/06/18 / #20180253454

Iterative widening search for designing chemical compounds

Techniques facilitating iterative widening search for designing chemical compounds are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, an indication of a constrained structure portion of a chemical compound and a first unconstrained structure portion of the chemical compound. ... International Business Machines Company

09/06/18 / #20180253453

Iterative widening search for designing chemical compounds

Techniques facilitating iterative widening search for designing chemical compounds are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, an indication of a constrained structure portion of a chemical compound and a first unconstrained structure portion of the chemical compound. ... International Business Machines Company

09/06/18 / #20180253444

Disk image introspection for storage systems

In response to an i/o request, a processor reconstructs a file system request by laying out a disk image, performing type-specific introspection on the disk image including determining disk image type and using a file system specific process for a particular type of file system located in the disk image for analyzing the disk image structure.. . ... International Business Machines Company

09/06/18 / #20180253432

Question pre-processing in a question and answer system

Mechanisms are provided for assembling natural language user inputs into questions for a question-and-answer (qa) system. The mechanisms initialize a timer to a threshold amount of time, receive a first input of content-bearing natural language from a user computing device, and initiate running of the timer in response. ... International Business Machines Company

09/06/18 / #20180253431

Question pre-processing in a question and answer system

Mechanisms are provided for assembling natural language user inputs into questions for a question-and-answer (qa) system. The mechanisms initialize a timer to a threshold amount of time, receive a first input of content-bearing natural language from a user computing device, and initiate running of the timer in response. ... International Business Machines Company

09/06/18 / #20180253423

Computational storage for distributed computing

Computational storage techniques for distribute computing are disclosed. The computational storage server receives input from multiple clients, which is used by the server when executing one or more computation functions. ... International Business Machines Company

09/06/18 / #20180253381

Cache management in a stream computing environment that uses a set of many-core hardware processors

Disclosed aspects relate to cache management in a stream computing environment that uses a set of many-core hardware processors to process a stream of tuples by a plurality of processing elements which operate on the set of many-core hardware processors. The stream of tuples to be processed by the plurality of processing elements which operate on the set of many-core hardware processors may be received. ... International Business Machines Company

09/06/18 / #20180253380

Cache management in a stream computing environment that uses a set of many-core hardware processors

Disclosed aspects relate to cache management in a stream computing environment that uses a set of many-core hardware processors to process a stream of tuples by a plurality of processing elements which operate on the set of many-core hardware processors. The stream of tuples to be processed by the plurality of processing elements which operate on the set of many-core hardware processors may be received. ... International Business Machines Company

09/06/18 / #20180253379

Cache management in a stream computing environment that uses a set of many-core hardware processors

Disclosed aspects relate to cache management in a stream computing environment that uses a set of many-core hardware processors to process a stream of tuples by a plurality of processing elements which operate on the set of many-core hardware processors. The stream of tuples to be processed by the plurality of processing elements which operate on the set of many-core hardware processors may be received. ... International Business Machines Company

09/06/18 / #20180253372

Performance test of software products with reduced duration

A method and system for testing performance of a software product. One or more complete executions of a performance test of corresponding versions of the software product are performed. ... International Business Machines Company

09/06/18 / #20180253371

Resuming a remote debugging session using a backup node

Aspects include detecting, by an agent of a remote debugging tool that a first controller currently associated with the agent for a debugging session has not responded to a status inquiry from the agent. The first controller interacts with an end user, sends requests to the agent to operate a target program, and processes responses from the agent. ... International Business Machines Company

09/06/18 / #20180253342

Discovery and exposure of transactional middleware server-based applications as consumable service endpoints

The present disclosure relates to techniques for discovering and exposing middleware applications as service endpoints through a universal connector in a middleware-agnostic fashion that does not require additional coding. In one embodiment, a back-end middleware system identifies a set of middleware applications that operate on an input/output (i/o) data area. ... International Business Machines Company

09/06/18 / #20180253340

Operation efficiency management with respect to application compile-time

Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Company

09/06/18 / #20180253339

Operation efficiency management with respect to application compile-time

Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Company

09/06/18 / #20180253338

Operation efficiency management with respect to application compile-time

Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Company

09/06/18 / #20180253337

Operation efficiency management with respect to application run-time

Disclosed aspects relate to operation efficiency management in a shared pool of configurable computing resources. A first set of processing operations of a first application may be detected. ... International Business Machines Company

09/06/18 / #20180253325

Cognitive screen sharing with contextual awareness

A method for cognitive screen sharing protection is provided. The method may include, in determining a screen sharing session of a client computing device associated with a user has been initiated, receiving, by a processor, a plurality of pertinent state data associated with the client computing device. ... International Business Machines Company

09/06/18 / #20180253324

Cognitive screen sharing with contextual awareness

A method for cognitive screen sharing protection is provided. The method may include, in determining a screen sharing session of a client computing device associated with a user has been initiated, receiving, by a processor, a plurality of pertinent state data associated with the client computing device. ... International Business Machines Company

09/06/18 / #20180253320

Dynamic cloud image updates based on subjective customization and user input

A mechanism is provided for use with a set of images including a first image, with each image of the set of images respectively representing a computer and respectively including software and configuration settings data. The mechanism deploys a plurality of first image instantiations of the first image for respective use by a plurality of users. ... International Business Machines Company

09/06/18 / #20180253312

Latent modification instruction for transactional execution

An instruction stream includes a transactional code region. The transactional code region includes a latent modification instruction (lmi), a next sequential instruction (nsi) following the lmi, and a set of target instructions following the nsi in program order. ... International Business Machines Company

09/06/18 / #20180253307

Selecting processing based on expected value of selected character

An instruction defined to be a looping instruction is obtained and processed. A determination is made as to whether an obtained selected character is an expected selected character. ... International Business Machines Company

09/06/18 / #20180253306

Dynamically selecting a memory boundary to be used in performing operations

A selected boundary of memory to be used in processing an instruction is dynamically selected, based on a predictor. The instruction is decoded, and the decoding provides a sequence of operations to perform a specified operation. ... International Business Machines Company

09/06/18 / #20180253305

Selecting processing based on expected value of selected character

An instruction defined to be a looping instruction is obtained and processed. A determination is made as to whether an obtained selected character is an expected selected character. ... International Business Machines Company

09/06/18 / #20180253304

Dynamically selecting version of instruction to be executed

Dynamically selecting a version of an instruction to be executed. Based on processing, a version of an instruction to be executed is selected. ... International Business Machines Company

09/06/18 / #20180253303

String sequence operations with arbitrary terminators

An instruction architecturally defined to be a looping instruction, in which a loop is configured to repeat a plurality of times to perform an operation on up to a defined number of units of data, is to be processed. The processing includes replicating a selected character a number of times to provide a replicated selected character, and using a sequence of operations to perform the operation, the sequence of operations replacing the loop and providing a non-looping sequence to perform the operation on up to the defined number of units of data. ... International Business Machines Company

09/06/18 / #20180253302

Move string processing via inline decode-based micro-operations expansion

Move string processing via inline decode-based micro-operations expansion. An instruction is obtained, and the instruction, which is to perform a move string operation, is decoded. ... International Business Machines Company

09/06/18 / #20180253301

Compare string processing via inline decode-based micro-operations expansion

Compare string processing via inline decode-based micro-operations expansion. An instruction, which is to perform a compare string operation, is decoded. ... International Business Machines Company

09/06/18 / #20180253300

Search string processing via inline decode-based micro-operations expansion

An instruction defined to be a looping instruction that repeats a plurality of times to perform an operation on a defined amount of data is obtained. The looping instruction is expanded into a sequence of operations. ... International Business Machines Company

09/06/18 / #20180253294

Electronic update handling based on user activity

Aspects of the present invention provide an approach for performing a computer program update on a target computer. In an embodiment, a target computer having a location, a user, a computer program, and a computer program update is determined. ... International Business Machines Company

09/06/18 / #20180253292

Building deployment packages that reference versions of files to be deployed

A computer-implemented method for deploying a build output package to a user includes: receiving a software build having a plurality of data sets and having a build version in a build output storage component; labeling each data set in the plurality of data sets with a unique identifier; receiving a package request requesting one or more data sets associated with the build version; building a package manifest that includes the unique identifier upon receiving the package request; copying each of the requested data sets and combining each of the copied data sets into a build output package based upon the package manifest, the copying and combining commencing upon building or completion of the package manifest; sending a copy of the build output package to the user; and deleting the build output package from the storage component in response to sending the copy of the build output package to the user.. . ... International Business Machines Company

09/06/18 / #20180253290

Compiling a parallel loop with a complex access pattern for writing an array for gpu and cpu

Computer-implemented methods are provided for compiling a parallel loop and generating graphics processing unit (gpu) code and central processing unit (cpu) code for writing an array for the gpu and the cpu. A method includes compiling the parallel loop by (i) checking, based on a range of array elements to be written, whether the parallel loop can update all of the array elements and (ii) checking whether an access order of the array elements that the parallel loop reads or writes is known at compilation time. ... International Business Machines Company

09/06/18 / #20180253289

Compiling a parallel loop with a complex access pattern for writing an array for gpu and cpu

Computer-implemented methods are provided for compiling a parallel loop and generating graphics processing unit (gpu) code, and central processing unit (cpu) code for writing an array for the cpu and the cpu. A method includes compiling the parallel loop by (i) checking, based on a range of array elements to be written, whether the parallel loop can update all of the array elements and (ii) checking whether an access order of the array elements that the parallel loop reads or writes is known at compilation time. ... International Business Machines Company

09/06/18 / #20180253282

Overflow detection for sign-magnitude adders

A circuit is provided which includes arithmetic computation logic configured to add or subtract operands of variable length to produce a result in a sign-magnitude data format. The circuit also includes an overflow detector to provide an overflow signal indicative of whether the result fits within a specified result length l. ... International Business Machines Company

09/06/18 / #20180253249

Reallocating storage resources to computing devices

A computer-implemented method includes identifying a storage reallocation plan associated with a primary storage volume, a secondary storage volume, and one or more client computing devices; determining a systematic importance indicator associated with the primary storage volume; and determining a systematic connectivity indicator associated with the storage reallocation plan and the one or more client computing devices. The computer-implemented method further includes determining a storage reallocation conclusion based on the systematic importance indicator and the systematic connectivity indicator. ... International Business Machines Company

09/06/18 / #20180253248

Dynamic management of memory allocation in a database

A method is provided for managing memory allocation in a database. The method determines a preferred statement among defined statements with defined sizes of objects. ... International Business Machines Company

09/06/18 / #20180253247

Method and system for memory allocation in a disaggregated memory architecture

Embodiments of the present invention disclose a method, computer program product, and system for allocating memory. A computer receives a request for memory to be allocated to a computer node and determines if the allocation request needs to be carried out on a cluster level, a server rack level, or on a server level. ... International Business Machines Company

09/06/18 / #20180253246

Method and system for memory allocation in a disaggregated memory architecture

Embodiments of the present invention disclose a method, computer program product, and system for allocating memory. A computer receives a request for memory to be allocated to a computer node and determines if the allocation request needs to be carried out on a cluster level, a server rack level, or on a server level. ... International Business Machines Company

09/06/18 / #20180253245

Pre-backing virtual storage using learning data

A computer system includes memory and a processor configured to manage memory allocation. Aspects include receiving a request to execute a computer program and obtaining a learned data file for the computer program, the learned data file including a history of memory allocation requests and memory access requests by the computer program. ... International Business Machines Company

09/06/18 / #20180253244

Method and system for memory allocation in a disaggregated memory architecture

Embodiments of the present invention disclose a method, computer program product, and system for allocating memory. A computer receives a request for memory to be allocated to a computer node and determines if the allocation request needs to be carried out on a cluster level, a server rack level, or on a server level. ... International Business Machines Company

09/06/18 / #20180253242

Managing storage protection faults

Management of storage used by pageable guests of a computing environment is facilitated. A query instruction is provided that details information regarding the storage location indicated in the query. ... International Business Machines Company

09/06/18 / #20180253237

Processing of a set of pending operations for a switchover from a first storage resource to a second storage resource

A determination is made that data stored in an extent of a first storage resource is to be moved to an extent of a second storage resource. Operations that are still awaiting to start execution in the first storage resource after the data stored in the extent of the first storage resource has been moved to the extent of the second storage resource, are configured for execution in the second storage resource.. ... International Business Machines Company

09/06/18 / #20180253233

Storage in tiered environment with cache collaboration

Various embodiments for managing data by a processor in a multi-tiered computing storage environment. Based on input/output (i/o) statistics, a ranking mechanism is applied to differentiate data between at least a cache rank and a solid state drive (ssd) rank. ... International Business Machines Company

09/06/18 / #20180253217

Contextual determination of emotion icons

A method, computer program product, and system for contextual determination of emotion icons. The method includes, for a particular user, determining an emotion icon to automatically input into a message, based on a class of the user, a current mood of the user, and the recipient of the message. ... International Business Machines Company

09/06/18 / #20180253208

Simplified user interface for smart devices

A system, method and program product for implementing a simplified touch screen interface for collecting character data. A device is disclosed having a touch screen interface, wherein the touch screen interface includes: a primary view that displays rotating character sets, wherein each one of the character sets sequentially rotates into an active position, and wherein a character set in the active position is selectable in response to a first touch to a uniform input region; a secondary view that displays rotating characters, wherein each one of the rotating characters sequentially rotates into the active position, and wherein a character in the active position is selectable in response to a second touch to the uniform input region; and wherein the rotating characters displayed in the secondary view are determined based on the character set selected in the primary view.. ... International Business Machines Company

09/06/18 / #20180253088

Non-functional requirement stimulus testing for robots

In an approach to non-functional requirement stimulus testing of a robot, one or more computer processors receive one or more stimulus parameters to test. The one or more computer processors trigger the one or more stimulus parameters in the robot. ... International Business Machines Company

09/06/18 / #20180252842

Ice formation and ice depth estimation system

Embodiments for estimating ice formation and depth by a processor. Ice formation and ice depth of a selected region of water may be cognitively forecasted using a prediction model such that the prediction model identifies similar characteristics between the selected region of water and one or more alternative regions of water by analyzing content of one or more data sources associated with an ontology of concepts representing a domain knowledge related to the selected region of water and the one or more alternative regions.. ... International Business Machines Company

09/06/18 / #20180252769

Iterative n-detect based logic diagnostic technique

Techniques relate to an interactive logic diagnostic process. A diagnostic iteration loop is performed. ... International Business Machines Company

09/06/18 / #20180252747

Integrated self-coining probe

A probe head that contains a coining surface and a plurality of probe tips integrated on a same side of the probe head is provided. The probe head has a first portion and a laterally adjacent second portion, wherein the first portion of the probe head contains the coining surface, and the second portion of the probe head contains the plurality of the probe tips. ... International Business Machines Company

09/06/18 / #20180252662

Biosensor calibration structure containing different sensing surface area

A biosensor calibration structure is provided that includes at least two electrode structures in which at least one of the electrode structures has a non-random nanopattern on the sensing surface which provides a different sensing surface area than at least one other electrode structure. The at least one other electrode structure may be non-patterned (i.e., flat) or have another non-random nanopattern on the sensing surface. ... International Business Machines Company

09/06/18 / #20180252577

Using ultraviolet sensor data to determine a pseudo location of a user

Embodiments of the invention are directed to a method for determining a pseudo location of a user. The method includes collecting, by a processing device, ultraviolet (uv) sensor data from a uv sensor of a user device of the user. ... International Business Machines Company

09/06/18 / #20180252548

Visualizing unidirectional traffic information

A computer-implemented method and system for providing unidirectional traffic flow distributions. The method includes generating a directed graph representing a position of a vehicle and a road network within a predetermined distance of the position of the vehicle, wherein vertices represent decision points along an edge and edges represent route segments between adjacent vertices, determining a plurality of travel routes within the directed graph by estimating a shortest path and at least one index for each edge in the directed graph, wherein each travel route includes one or more edges, selecting a travel route from the plurality of travel routes, and outputting unidirectional traffic information for edges included along the travel route.. ... International Business Machines Company

09/06/18 / #20180252396

Lighting pattern optimization for a task performed in a vicinity

A cognitive illumination system is provided. The cognitive illumination system includes a light source communicatively coupled to a servomechanism, wherein the servomechanism is configured to manipulate the light source in space, a tracking assembly configured to capture and track objects in the space and a processor communicatively coupled to the light source, the servomechanism and the tracking assembly. ... International Business Machines Company

09/06/18 / #20180252076

Cognitive enhanced oil recovery advisor system based on digital rock simulator

A method is provided including calculating a first property vector indicative of physical properties derived from a digital image of a first rock sample; determining a set of one or more similar rock samples by calculating a value indicating a similarity between the first rock sample and second rock samples based on the first property vector and second property vectors associated with the second rock samples; selecting a list of fluid additives based on existing enhanced fluid recovery efficiency values associated with the similar rock samples; performing, for each of the fluid additives, a simulation of a flow of fluid through a digital model of the first rock to determine a simulated enhanced fluid recovery efficiency value for the respective fluid additives; and outputting an optimal fluid additive for the first rock sample based at least in part on the calculated similarity values and simulated enhanced fluid recovery efficiency values.. . ... International Business Machines Company

09/06/18 / #20180251935

Automated selection of settings for an ironing device

Embodiments provide a method and device that enables automatic selection of settings for ironing one or more pieces of fabric. A digital camera on an ironing device captures an image of a fabric. ... International Business Machines Company

09/06/18 / #20180251595

Carbon black modified polyesters

Embodiments of the disclosure generally provide compositions and methods involving the production of polyester composite materials that contain covalently bonded carbon black particles. The carbon black particles have surface functional groups that enable the grafting of a polyester, and/or initiate the ring opening of a monomer to create a polyester grown from the surface of the particle.. ... International Business Machines Company

09/06/18 / #20180250834

Non-functional requirement testing for robots

In an approach to non-functional requirement testing of a robot, a computer determines one or more kinematic actions included in a received command. The computer determines at least one component of the robot included in an operation of the one or more kinematic actions. ... International Business Machines Company

09/06/18 / #20180250676

Deterministic lateral displacement arrays

A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Company

09/06/18 / #20180250675

Deterministic lateral displacement arrays

A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Company

09/06/18 / #20180250674

Deterministic lateral displacement arrays

A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Company

09/06/18 / #20180250673

Deterministic lateral displacement arrays

A deterministic lateral displacement array that includes a channel, within a substrate, having a first sidewall, a second sidewall, and a channel length. A condenser portion that includes an entry port and an exit port. ... International Business Machines Company

09/06/18 / #20180249947

Consultation advice using ongoing monitoring

Consultation advice based on ongoing user monitoring is provided. In various embodiments, first physiological data of a user is collected by a wearable device for a first time period. ... International Business Machines Company

08/23/18 / #20180242467

Dust guard structure

An apparatus for a dust guard structure includes a particle guard coupled to a top surface of a circuit board, wherein the particle guard is located along a first side of the circuit board between an edge of the circuit board and a first electronic component. The dust guard structure further includes the first electronic component electrically coupled to the circuit board via one or more electronic connections, wherein a height of the particle guard is greater than a height of each of the one or more electrical connections of the first electronic component. ... International Business Machines Company








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with International Business Machines Company in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for International Business Machines Company with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###