doc_id
stringlengths 7
11
| appl_id
stringlengths 8
8
| flag_patent
int64 0
1
| claim_one
stringlengths 12
21.5k
|
---|---|---|---|
9177080 | 13795783 | 1 | 1. A method comprising: determining, by a computing device, relevance intervals for corresponding terms in text associated with a content item, the text comprising a plurality of term strings and each relevance interval identifying one or more sections of the content item that are relevant to a corresponding term; after determining the relevance intervals, generating a first set of nodes for a first term string from the plurality of term strings, the first set of nodes comprising both a node for each term in the first term string and at least one node for a term from a second term string, and the term from the second term string having a corresponding relevance interval identifying a section of the content item with an occurrence of at least one term from the first term string; generating a second set of nodes for the second term string from the plurality of term strings, the second set of nodes comprising both a node for each term in the second term string and at least one node for a term from the first term string, and the term from the first term string having a corresponding relevance interval identifying a section of the content item with an occurrence of at least one term from the second term string; determining a plurality of connections between nodes in the first set of nodes and the second set of nodes; and determining, using the first set of nodes, second set of nodes or the plurality of connections, one or more segment boundaries within the content item. |
8423886 | 13225090 | 1 | 1. A system for document analysis, comprising a processor and software configured to a) receive textual documents over an electronic communication network and convert textual documents into image files, identify text in said image files, wherein said text is mapped to the document image using a database comprising text of the document; b) permit a user to add contextual markups to said image files wherein said contextual markups are images or HTML tags that are added to an invisible image that maps exactly onto each image of said image file, and wherein said image file is not modified, c) generate an originality report, wherein said generating said originality report comprises the step of highlighting said sections of said image file identified in the originality report as allegedly containing plagiarized text, wherein said highlighting is glyph aware highlighting that associates glyphs with images using the pixel coordinates of the image, which maps to a text database of said document; and d) display said image file on a display screen, wherein said image file simultaneously displays said contextual markups and said highlights. |
7797269 | 11693112 | 1 | 1. A method, comprising: operating a portable apparatus so as to: store at least one context sensitive dictionary having a plurality of first words therein, a subset of one or more of the first words being associated with one or more respective associated words and phrases, the or each respective associated word and phrase representing an instance of the first word with which it is associated; enable character input by a user of the portable apparatus; compare input characters when input with the first words in the at least one context sensitive dictionary; determine, in dependence on the comparison, one or more first words in the context sensitive dictionary corresponding, at least partially, to the input characters; select, in dependence on the determination, one or more associated words and phrases associated with the determined first words; and display the selected one or more associated words and phrases to the user as a substitution for the input characters. |
20120151433 | 12966902 | 0 | 1. A reverse engineering mockup system, comprising: an introspection manager component configured to capture a plurality of states associated with a plurality of user interface (UI) control hierarchies of a target application; a mockup processing component configured to generate a model representation based on the plurality of states; and an output component configured to render the model representation in an editable format. |
20090043836 | 11837387 | 0 | 1. A computer implemented method of operating a multiplication circuit to compute the product of two operands (A and B), at least one of which is wider than a width associated with the multiplication circuit, where each of the operands comprises one or more contiguous ordered word-wide operand segments (A j and B i ) characterized by specific weights j and i, where j is an integer from 0 to k and where i is an integer from 0 to m, and a word is a specified number of bits (n), and where the multiplication circuit executes a matrix of word-wide operand segment pair multiplication operations, the matrix comprising m+1 rows and k+m+2 columns, each row having a weight x and each column having a weight y, the multiplication circuit having access to a memory, the method comprising: performing multiplication operations on a pair of rows at one time, where for each pair of rows a pair of corresponding B i word-wide operand segments are read from the memory and word-wide operand segment pair multiplication operations (A j *B i ) are iteratively performed for each of k+2 columns, such that for each column in the matrix a maximum of two additional memory read operations and one memory write operation is required. |
20150331867 | 14677061 | 0 | 1. A system for comparing a biometric sample against a biometric dataset, the system comprising: a database storing at least one biometric dataset; a comparison module configured to iteratively provide a comparison score for each record in the biometric dataset, wherein the comparison score indicates a likelihood of match between an individual record in the biometric dataset and the biometric sample; wherein, during each iteration, the comparison model completing a series of steps during each iteration comprising: retrieving a model of each of the plurality of records; comparing the model of each of the plurality of records against the biometric sample; generating the comparison score for each of the plurality of records; iteratively compare the biometric sample against a plurality of records; and wherein the resolution of the retrieved model increases with each iteration, and where the iterative process continues until a final list of potential match candidates is determined; and a processor configured to receive data indicative of the biometric sample and iteratively engage the comparison model such that results of the first iteration are provided as an input to a second iterator. |
20150193508 | 14666274 | 0 | 1. A method comprising: identifying a set of topics appearing in text strings included in a plurality of data sources; assigning a topic identifier to each identified topic; associating each topic identifier with a context vector, each context vector comprising: a plurality of context confidence values, each context confidence value representing a relationship between a given identified topic and an additional identified topic that co-occurs within a text string, from the plurality of data sources, with the given identified topic; and where each context confidence value of the plurality of context confidence values is based upon a combination of a topic confidence value of the given identified topic and a topic confidence value of the additional identified topic that co-occurs within the text string; receiving a search query comprising a keyword; identifying one or more topic identifiers associated with the keyword included in the search query; identifying one or more text strings from the plurality of data sources that include topics associated with the identified one or more topic identifiers; and generating a search result for the search query that includes the identified text strings. |
20160078126 | 14949829 | 0 | 1. A computer-implemented system for generating document groupings, comprising: a lexicon of terms extracted from a set of documents and comprising a frequency of each extracted term within each document; concepts each comprising two or more of the extracted terms; a selection module to select a subset of the documents in the set based on the term frequencies; a grouping module to group the subset of documents into clusters based on the concepts; a similarity module to calculate a similarity of each document cluster with at least one document based on a distance by summing the frequency of each term in that document and a weight of the cluster for each of the terms; and an update module to update the weights until a rate of change for each cluster becomes constant. |
4763242 | 06790570 | 1 | 1. A computing device, comprising: a bus which carries data; an assist, which can be coupled to the bus and which can be uncoupled from the bus, including a first functional means for executing an assist instruction; a main processor, coupled to the bus, including a second functional means for executing a set of basic instructions; a system memory which contains emulation code allowing the emulation of the assist instruction; and, a communication means, coupled to the main processor and coupled to the assist when the assist is coupled to the data bus, for enabling the main processor to determine if the assist is able to execute the assist instruction, wherein the main processor, via the data bus, transfers the assist instruction to the assist when the assist is able to execute the assist instruction and wherein the main processor, using the emulation code within the system memory, executes the assist instruction when the assist is unable to execute the assist instruction. |
20080301440 | 11754658 | 0 | 1. A computer-implemented method comprising: executing a secure kernel in a data processing system, wherein the secure kernel includes a plurality of sensitive portions, and wherein the executing includes loading a kernel extension, wherein the kernel extension is associated with a cryptographic key; selecting a subset of the plurality of sensitive portions based on the cryptographic key; deleting said subset; and transferring control to the kernel extension subsequent to said deleting. |
9678860 | 13689220 | 1 | 1. A method, comprising: receiving, by a processing device, a request to update a first size of a plurality of portions of memory in a memory pool instance, wherein the memory pool instance is associated with a first memory pool subinstance and a first identifier for the first memory pool subinstance; creating, by the processing device, a second memory pool subinstance from the first memory pool subinstance in view of the request, wherein the second memory pool subinstance comprises portions of memory of a second size, wherein the creating of the second memory pool subinstance comprises adjusting the first size of the plurality of portions of memory associated with the memory pool instance to correspond with the second size; generating, by the processing device, a second identifier for the second memory pool subinstance in view of the first identifier, the second memory pool subinstance is used to allocate new objects in response to an allocation request; adding, by the processing device, the second identifier to a list of available memory portions for the memory pool instance; and deleting, by the processing device, the first identifier associated with the first memory pool subinstance from the list of available memory portions. |
8438308 | 13337773 | 1 | 1. A non-transitory memory device storing instructions, the instructions comprising: one or more instructions which, when executed by one or more processors, cause the one or more processors to: determine that an occurrence of a particular event may cause a failure of at least two links or at least two nodes; determine a relationship between the at least two links or the at least two nodes based on determining that the occurrence of the particular event will cause the failure of the at least two links or the at least two nodes; determine a first value associated with the at least two links or the at least two nodes, the first value indicating a likelihood that a failure of a first link of the at least two links, or a failure of a first node of the at least two nodes, resulting from the occurrence of the particular event, will result in a failure of other links of the at least two links or other nodes of the at least two nodes; assign, based on the relationship, the first value to: each link of the at least two links, or each node of the at least two nodes; determine a first cost for each link, of the at least two links, or each node, of the at least nodes, based on the first value, the first cost being associated with transmitting data via the link or the node; and determine, based on the first cost, a primary path and a secondary path through a network. |
9569497 | 14301272 | 1 | 1. A computer program product comprising a machine-readable medium storing instructions that, when executed by at least one programmable processor, cause the at least one programmable processor to perform operations for improving distributed query processing in a database management system, the operations comprising: generating a result column, the generating comprising a plurality of worker jobs running in parallel to read tasks from a shared queue as part of a query plan operation, the query plan operation comprising a group-by column within an input set of input columns, the group-by column comprising an original dictionary for all values contained within the group-by column; creating a new dictionary for the result column, the new dictionary preserving a same ordering as the original dictionary; determining that the new dictionary has fewer entries than the original dictionary for the group-by column such that mapping is required between old value identifiers within the group-by column and new value identifiers within the result column; and renaming the old value identifiers to the new value identifiers using a mapping vector. |
8005767 | 11756690 | 1 | 1. A device comprising: a sensor operable to sense target events; a processor in communication with said sensor, said processor operable to organize target training event data into a plurality of clusters of target event data based on target event similarities, each cluster of said plurality of clusters being described by a mean vector and a covariance matrix, said processor operable to determine relevant features of each cluster, to logically exclude a portion of the plurality of clusters and to assign unknown target data events in the closest cluster based on a normalized distance, said target training event data comprises a plurality of target training event instances, each target training event instance of said target training event data corresponding to more than one cluster of said plurality of clusters; and a classifier in communication with said processor, said classifier operable iteratively to rank said each target training event data instance by the normalized distance, to identify a misclassification level of clusters with incorrectly organized target event training instances, to identify an excess correctness of clusters with excess correctly organized target event training instances, and to eliminate clusters with one of a misclassification level and an excess correctness without increasing classifications errors, said classifier operable to provide a user with classification information. |
7814402 | 11569017 | 1 | 1. An iterative decoder comprising: at least one check node implementing at least one check node instance; at least one variable node implementing at least one variable node instance; and at least one interconnection between the at least one check node and the at least one variable node, wherein check messages are passed in digit-serial format and variable messages are passed in digit-serial format. |
20110211075 | 13123858 | 0 | 1. Device for motion estimation in video image data, comprising: a motion estimation unit that estimates a current motion vector for an area of a current image by determining a set of temporal and/or spatial candidate motion vectors and selects a best motion vector from the set of candidate motion vectors, wherein the motion estimation unit is further adapted for substantially doubling one or more of the candidate motion vectors and for including the one or more substantially doubled candidate motion vectors in the set of candidate motion vectors. |
20180004709 | 15201123 | 0 | 1. A computer-executable method for performing a general matrix-matrix multiplication (GEMM) operation using a kernel compiled with optimal maximum register count (MRC), comprising: generating the kernel compiled with optimal MRC, which involves determining a fastest compiled kernel among a set of compiled kernels by comparing the speeds of the compiled kernels, each compiled kernel being compiled with a different MRC value between zero and a predetermined maximum number of registers per thread, wherein the fastest compiled kernel is determined to be the kernel with optimal MRC; receiving data representing at least two matrices; selecting the kernel compiled with optimal MRC; and performing the GEMM operation on the two matrices using the selected kernel. |
7836428 | 11082204 | 1 | 1. A computer readable storage device having computer readable program instructions embodied thereon for programming a processor, said instructions consisting of: a computer software application manifesting an entirely declarative system for creating a software program comprising properties for declaratively establishing relationships between data elements, said relationships comprising descriptions of logic and data, wherein said entirely declarative system comprises one or more declarative lattice structures, each respective lattice having a plurality of configurable constructs comprising: (i) one or more declarative attributes, each attribute configurable to select an internal behavior of said respective lattice; (ii) one or more declarative data access sites, each site configurable to define respective data access points for accessing lattices external to said respective lattice, and wherein said attributes and data access sites configure each said respective lattice to complete a singular computing task, and each respective lattice is configured to instantiate and execute, either alone or in relation to other lattices of said declarative system. |
8494996 | 12821946 | 1 | 1. In association with a network that has a resource set comprising multiple resources, wherein a set of rules is applied to arrange respective resources into a structure comprising an object graph, and changes are disposed to occur over time to one or more resources of the resource set, a method comprising the steps of: providing an initial object graph to a system database, wherein the initial object graph is either generated by applying the set of rules to respective resources included in the resource set at a specified time, or else is provided at a specified time by revising a previous object graph, selectively, the resource set at the specified time comprising an initial resource set; providing a working memory with a copy of the initial object graph, wherein the working memory is maintained in separation from the system database; discovering a changed fact that is associated with one of the resources of the initial resource set; responsive to discovering the changed fact, determining one or more modifications that are required by the changed fact to be made to the initial object graph; responsive to determining the one or more modifications required by the changed fact, revising the initial object graph in the working memory to produce a revised object graph that includes each of the required modifications; and responsive to said revision of the initial object graph in the working memory, making the same revision to the initial object graph in the system database, to provide the revised object graph therein. |
20140156259 | 13689804 | 0 | 1. A method for collecting grounded linguistic data, comprising: generating stimulus information having at least one stimulus component selected from an inventory of available stimulus components; presenting the stimulus information to a plurality of human recipients; receiving, from each human recipient, a linguistic description of the stimulus information, a plurality of received linguistic descriptions collectively comprising linguistic information expressed in one or more languages; and storing the linguistic information in a data store, there being a nexus between the linguistic information and said at least one stimulus component that forms a part of the stimulus information, there being an additional nexus between each stimulus component and a feature of a physical target environment. |
10057135 | 14556538 | 1 | 1. A method of managing a computing network, the method comprising: representing at least a portion of the computing network as a recursive architecture of elements representing bit transport, bit transformation and bit storage actions of the network, wherein the recursive architecture models elements in the computing network to abstract the actions therein in an information model that models the bit transport, bit transformation and bit storage actions of different network elements in the computing network recursively as data objects in a unified manner to represent networking, computing and storage actions together in the information model, and wherein the recursive architecture models the bit transport actions within a layer via subnetworks and links and between layers via adaptation and termination functions for bit transport and via a Universal Turing Machine which models bit transformation for the computing action as an input, an action on the input, and an output; associating a respective set of one or more elements with at least one system implementing functions of the portion of the computing network; and using the information model of the recursive architecture of elements to manage the at least one system implementing functions of the portion of the computing network, wherein the information model is based on ITU-T Recommendation G.800 and the management of the computing and storage actions is provided via the information model along with the management of the networking actions. |
9993656 | 14895757 | 1 | 1. A method for stimulation of target neural tissue with a system including a biocompatible shaft having distal and proximal ends and a longitudinal axis and defining a hollow therein, the method comprising: forming at least one microcoil system that includes a corresponding microcoil characterized by a microcoil axis and that is equipped with a metallic shield element extending along and adjacent to a loop of said microcoil, said forming including juxtaposing said metallic shield element substantially tangentially parallel to a surface defined by said microcoil; defining an electrical terminal for said at least one microcoil system to receive an electrical waveform from a power source; defining a first angle based on at least one stereotactic mark associated with a target neural tissue and a second angle describing an orientation of the longitudinal axis with respect to said at least one stereotactic mark to provide, in operation of said at least one microcoil that has been activated by an electromagnetic input applied externally thereto, activation of a neuron having a predetermined orientation in said target neural tissue; and disposing said at least one microcoil system within the hollow that is electrically and fluidly insulated from an ambient medium surrounding the shaft to orient the microcoil axis at the first angle with respect to the longitudinal axis. |
9195717 | 13799683 | 1 | 1. A method, comprising: receiving, by at least one of one or more server devices and from a client, a search query; obtaining, by at least one of the one or more server devices, search results based on the search query, the search results identifying documents relevant to the search query; identifying, by at least one of the one or more server devices, image attributes associated with one or more of the documents, the image attributes identifying information, within the one or more of the documents, associated with images; obtaining, by at least one of the one or more server devices, classification metrics that include information for determining a measure of image intent associated with the search query, the measure of image intent representing a likelihood that image results are intended by the search query, the image results identifying images or video relevant to the search query, and the classification metrics identifying a plurality of keywords; determining, by at least one of the one or more server devices, the measure of image intent, associated with the search query, based on the image attributes and the classification metrics, the image attributes, for a particular document of the one or more of the documents, corresponding to at least one of: a particular quantity of keywords, within the particular document, that match the plurality of keywords identified by the classification metrics, or a particular keyword density based on the particular quantity of keywords and a quantity of text within the particular document; determining, by the at least one of the one or more server devices, whether the measure of image intent satisfies a threshold, the threshold being identified by the classification metrics; generating, by at least one of the one or more server devices, a search results document that selectively includes the image results or the search results based on whether the measure of image intent satisfies the threshold; and providing, to the client, the search results document. |
20140380266 | 13924105 | 0 | 1. A computer-implemented method comprising: in a design time environment, providing compute logic for data management to a parallelization engine as a first input, providing a skeleton template to the parallelization engine as a second input, and causing the parallelization engine to transform the compute logic into an instantiation of the skeleton describing the compute logic; and in a run time environment, causing the parallelization engine to embed the instantiation into a parallel execution plan for execution in parallel. |
RE46625 | 14569586 | 1 | 1. An Instant Messaging (IM) Communication system, comprising: two or more proprietary IM servers in a data-packet-network, each providing a different IM service and different IM protocol to specific clients; an IM server in a communication center, the IM server connected to the data-packet-network and to a Local Area Network (LAN), the LAN connecting computerized workstations used by agents of the communication center; a first data storage device storing a set of routing rules for the communication center; and stored a second data storage device storing agent data for the agents of the communication center, the data including agent availability of the agents and IM capability capabilities of the agents relative to one or more of the different IM protocols; wherein the IM server in the communication center receives IM messages from the two or more proprietary IM servers in the data-packet-network , the IM messages representing desired communication between the specific clients of the proprietary IM servers in the data-packet-network and an agent selected from the agents of the communication center, each of the IM messages adhering to a specific IM protocol, wherein the IM server in the communication center consults the communication center routing rules, IM protocol capabilities the IM capability of the agents, and the stored agent data to determine an available agent with the the needed the IM protocol capability that is detected to be needed , and establishes IM communication between one of the specific clients and the determined available agent determined to be available and to have having the needed IM protocol capability IM capability for exchanging one of the IM messages from the first one of the specific clients and the determined available agent, and wherein the consulting of the IM capability of the agents includes determining whether an agent device of the determined available agent has IM software adhering to the specific IM protocol corresponding to the IM messages . |
20020013892 | 09085187 | 0 | 1. An apparatus for a computer system comprising: a first processor configured to execute first instructions defined by a first instruction set architecture, wherein an operating system employed by said computer system is coded using said first instructions; and a second processor coupled to said first processor, wherein said second processor is configured to execute second instructions defined by a second instruction set architecture different than said first instruction set architecture, wherein an application program designed to execute within said operating system is coded using said second instructions; wherein said second processor is configured to execute said application program and said first processor is configured to execute said operating system, and wherein said second processor is configured to communicate with said first processor upon detecting a use of an operating system routine for said application program. |
9064008 | 13970545 | 1 | 1. A computer-implemented system for displaying visual classification suggestions for concepts, comprising: a processor to execute modules, comprising: a clustering module to provide at least one cluster comprising one or more uncoded concepts, each associated with a visual representation comprising a geometric shape, and one or more reference concepts, each associated with a visual representation of an assigned classification code; a neighborhood module to determine for at least one of the uncoded concepts a neighborhood comprising at least one of the reference concepts; a classification module to determine a classification code for the neighborhood based on the at least one of the reference concepts; a suggestion module to suggest the classification code of the neighborhood as a classification code for the uncoded concept, comprising a display module to display the visual representation of the suggested classification code placed on a portion of the geometric shape associated with the uncoded concept; a confidence module to determine a confidence level for the suggested classification code; a difference module to receive from a user a classification code different from the suggested classification code and associated with a visual representation; a comparison module to compare the confidence level to a threshold; and a discordance module to display a discordance between the suggested classification code and the received classification code when the confidence level exceeds the threshold, comprising a discordance display module to display the visual representation of the received classification code on a different portion of the geometric shape. |
9251078 | 13766165 | 1 | 1. A method of acquiring remote shared variable directory (SVD) information in a parallel computer, the parallel computer comprising a plurality of threads of execution, the threads organized into tasks, the parallel computer further comprising memory partitioned to provide each thread with a private memory and a shared memory, the method comprising: determining, by a runtime optimizer of the parallel computer, that a first thread of a first task requires shared resource data stored in a memory partition of a remote SVD corresponding to a second thread of a second task; in response to determining that the first thread of the first task requires the shared resource data stored in the memory partition of the remote SVD corresponding to the second thread, requesting from the second thread, by the runtime optimizer, SVD information associated with the shared resource data; and receiving from the second thread, by the runtime optimizer, the SVD information associated with the shared resource data, the SVD information including an address indicating where the shared resource data is stored in the memory partition of the remote SVD corresponding to the second thread. |
9672251 | 14499615 | 1 | 1. A method comprising: obtaining a plurality of seed facts, wherein each seed fact identifies a subject entity, an attribute possessed by the subject entity, and an object, and wherein the object is an attribute value of the attribute possessed by the subject entity; generating a plurality of patterns from the seed facts, wherein each of the plurality of patterns is a dependency pattern generated from a dependency parse, wherein a dependency parse of a text portion corresponds to a directed graph of vertices and edges, wherein each vertex represents a token in the text portion and each edge represents a syntactic relationship between tokens represented by vertices connected by the edge, wherein each vertex is associated with the token represented by the vertex and a part of speech tag, and wherein a dependency pattern corresponds to a sub-graph of a dependency parse with one or more of the vertices in the sub-graph having a token associated with the vertex replaced by a variable; applying the patterns to documents in a collection of documents to extract a plurality of candidate additional facts from the collection of documents, wherein applying the patterns to documents in the collection of documents comprises: applying the dependency patterns to documents from the collection of documents to identify matching sentences; generating an extraction from each matching sentence; and aggregating the extractions to generate the candidate additional facts; and selecting one or more additional facts from the plurality of candidate additional facts. |
20110107426 | 12611223 | 0 | 1. A computing system provides normal security services and high security services with a single operating system, comprising: a secure application programming interface (secure API) for the high security services, called by a pseudo normal thread executed while the computing system is in a normal security environment; a driver layer invoked by the secure API, calling a world switch instruction; a monitor, activated by the world switch instruction from the driver layer to save context of the pseudo normal thread, change the computing system to a high security environment, obtain a secure thread corresponding to the pseudo normal thread, create or restore context of the secure thread, and dispatch the secure thread to be executed by the computing system that has been changed to the high security environment, wherein, the secure thread relates to one of the high security services. |
20020191475 | 10045297 | 0 | 1. A memory device comprising: a memory; and a plurality of ports for accessing the memory of the memory device, each port having a serial communications link for receiving from and transmitting to an accessing device, each port using plesiosynchronous technique to receive symbols and using in-band symbols to transmit data and out-of-band symbols to transmit control information. |
20090119107 | 11933448 | 0 | 1. A method for determining whether a user has correctly read a target sentence string, comprising: receiving a sentence array including component words of the target sentence string; processing the sentence array to generate a symbolic representation of the target sentence string, the symbolic representation including a subset of words selected from the component words of the target sentence string, the subset of words having fewer words than the sentence array; receiving user speech input; processing the user speech input to recognize in the user speech input each of the words in the subset of words in the symbolic representation of the target sentence string; and upon recognizing the subset of words in the symbolic representation of the target sentence string, making a determination whether the user has correctly read the target sentence string. |
6021265 | 08840557 | 1 | 1. Data processing apparatus comprising: (i) a processor core operable to execute successive program instruction words of a predetermined plurality of instruction sets stored in a data memory; (ii) a program counter register for indicating an address of a next program instruction word in said data memory; (iii) logic operable to modify the contents of said program counter register in response to a current program instruction word; (iv) a processor core controller, responsive to one or more predetermined indicator bits of said program counter register, operable to control said processor core to execute program instruction words of a current instruction set selected from said predetermined plurality of instruction sets and specified by the state of said one or more indicator bits of said program counter register; and (v) a memory access controller operable to access program instruction words stored in said data memory, said access controller not being responsive to said one or more indicator bits of said program counter register. |
8938387 | 13903173 | 1 | 1. Audio coding system comprising: a linear prediction (LP) unit for filtering an audio signal based on a LP filter, the LP unit operating on a first frame length of the audio signal; an adaptive length transformation unit for transforming a frame of the audio signal into a transform domain, the transformation being a Modified Discrete Cosine Transform (MDCT) operating on a variable second frame length; a quantization unit for quantizing a MDCT-domain signal; a gain curve generation unit for generating MDCT-domain gain curves based on magnitude responses of the LP filter; and a mapping unit for mapping LP parameters to corresponding frames of the MDCT-domain signal; wherein the mapping unit interpolates LP polynomials generated on a rate corresponding to the first frame length so as to match frames of the MDCT-domain signal generated on a rate corresponding to the second frame length for usage as perceptual weights in the quantization unit. |
20120324459 | 13598280 | 0 | 1. A method comprising: accepting hierarchical data; performing a map-reduce job on the hierarchical data; said performing comprising: determining a cost of partitioning the data; determining a cost of redefining the job; thereupon selectively performing at least one step taken from the group consisting of: partitioning the data and redefining the job. |
7519790 | 11274686 | 1 | 1. A method comprising: configuring memory coupled with a processor through a memory interface by invoking one or more native processor instructions dedicated to the configuration of memory, wherein the configuring of memory is done without BIOS intervention. |
9298256 | 14603287 | 1 | 1. A method comprising: receiving, by a processor of a device, video data recorded by a camera; detecting, by the processor of the device, a movement in the video data corresponding to a selection of an object; during the movement, initiating, by the processor of the device, a search of an object-model database for one or more object models corresponding to the object; causing, by the processor of the device, a graphical interface to display information associated with object-models from the object-model database corresponding to results of the search; and causing the graphical interface to overlay the object with the object-models from the object-model database corresponding to results of the search, wherein the object-models are translucent such that the object is at least partially visible through the overlaid object-models. |
20010053143 | 09791523 | 0 | 1. A method for MIMO-OFDM communication, comprising encoding a first data block into a first plurality of encoded signals; encoding a second data block into a second plurality of encoded signals; transmitting each of the first and second pluralities of encoded signals on respective transmit antennas; receiving the transmitted signals on a plurality of receive antennas; pre-whitening the receive signals for each of the first and second data block signals; performing maximum likelihood detection on each of the pre-whitened received signals; and performing successive interference cancellation on the received signals. |
20030052921 | 10225424 | 0 | 1. A graphical user interface comprising: a control layer including a pattern look-up table having indexed entries containing data related to patterns and colors used to create interface objects; and means for commanding said control layer to draw a pattern on said interface referring to at least one of said indexed entries in said pattern look-up table. |
20080288554 | 12184796 | 0 | 1. A method for implementing distributed database management system operations on a computer cluster, the method comprising: defining ownership relationships between a plurality of computers in the computer cluster and a plurality of data nodes in the computer cluster, wherein a distributed database management system operation can be directly carried out by a first computer only on those data nodes owned by the first computer; monitoring database usage characteristics; and carrying out a re-architecture step in response to the database usage characteristics by redefining ownership relationships to improve the efficiency of the distributed database management system operations. |
20140223413 | 13758527 | 0 | 1. A method for creating a process of visual manipulations of objects of all kinds of software class or types (hereafter referred to as types) in an Integrated Development Environment (the IDE), said process includes adding any kinds of types to a toolbox, including types not derived from a specific class, not implementing specific interfaces, generic types and types without parameter-less constructors, said process includes design-time object creation from said toolbox, said process prepares objects so that said IDE may visually manipulate objects of any kinds of types, including types not derived from a specific class, not implementing specific interfaces, generic types and types without parameter-less constructors. |
20160132797 | 14995466 | 0 | 1. A method for determining appropriate runtime environments for execution of a process model, the method comprising the steps of: a computer receiving a process model, wherein the process model comprises a plurality of activities, wherein a first activity of the plurality of activities and a second activity of the plurality of activities are linked by a first relationship; the computer determining that the first activity of the plurality of activities and the second activity of the plurality of activities linked by the first relationship match a process pattern, wherein the process pattern comprises a predefined third activity and a predefined fourth activity linked by a predefined second relationship, and wherein the process pattern has a workload property; the computer prompting a user to input a value for the workload property; the computer receiving the value for the workload property; and the computer determining one or more runtime environments for execution of the process model by querying a list of a plurality of runtime environments, wherein each of the determined one or more runtime environments is capable of executing the process pattern and is capable of meeting the value for the workload property. |
20040064207 | 10260975 | 0 | 1. A method for organizing event content in the form of digital data, the method comprising the steps of: determining an event profile; obtaining the event content; and organizing the content based upon the event profile. |
20100191719 | 12752098 | 0 | 1. A method for managing a multi-tenant database system, the method comprising: providing access to data stored in a multi-tenant data structure, the multi-tenant data structure being implemented on a pool of computer servers, the multi-tenant data structure further being implemented by: storing data for multiple tenants in the multi-tenant data structure; defining the multi-tenant data structure to have a plurality of data columns and one or more index columns; defining a first data field for a first tenant of the multi-tenant data structure, the first field indicating a first data type; defining a second data field for a second tenant of the multi-tenant data structure, the second field indicating a second data type, wherein the second data type is different than the first data type; when records having data values in the first and second fields are created by the first and second tenants, storing the data values of first and second fields to a single column in the data structure, wherein the single column includes data values having different data types for different tenants in the multi-tenant data structure; receiving one or more requests to access data in the multi-tenant data structure; monitoring operations of the pool of servers; and distributing the one or more requests to access the multi-tenant data structure among the pool of computer servers in response to the monitored operations. |
9940548 | 15049149 | 1 | 1. An image recognition method performed by a computer of an image recognition device, comprising: receiving an image; acquiring first processing result information including values of a first processing result of first convolution processing at positions of a plurality of pixels that constitute the image by performing the first convolution processing on the image by using a first convolution filter; acquiring second processing result information including values of a second processing result of second convolution processing at positions of a plurality of pixels that constitute the image by performing the second convolution processing on the image by using a second convolution filter that is different from the first convolution filter in resolution, scale parameter or color to be processed; determining one feature for each of the positions of the plurality of pixels on the basis of the values of the first processing result and the second processing result at the positions of the plurality of pixels included in the first processing result information and the second processing result information and outputting the determined feature for each of the positions of the plurality of pixels; performing recognition processing on the basis of the determined feature for each of the positions of the plurality of pixels; and outputting recognition processing result information obtained by performing the recognition processing. |
8473444 | 12549689 | 1 | 1. A computer system comprising: a plurality of environments including one or more virtualized environments and a system environment, the system environment being a non-virtualized environment; a virtualization environment manager operating in the system environment, wherein the virtualization environment manager is configured to: detect a request to perform an action made by a first process in one of the plurality of environments, wherein the action comprises an action taken from the group comprising: communicating with a second process; writing a value to a registry; reading a value from a registry; writing a file to a file system; reading a file from a file system; accessing a physical resource; and accessing a named object; identify data associated with said request, wherein said data identifies: the first process; a base environment corresponding to the first process, wherein a base environment of a process is an environment in which a process is running; and a resource to which the action is targeted; retrieve a first rule in a programmable database of rules in response to detecting the request, wherein the first rule corresponds to at least one of the first process, the base environment, and the resource, and identifies a target environment of the plurality of environments in which to process the request, wherein the target environment is different from the base environment of the process; and direct the request to the target environment. |
7684974 | 11276529 | 1 | 1. A system for displaying an audit diagram comprising: a monitor; a constructing logic to construct a text equivalent from an input text, wherein the text equivalent is an alternating sequence of one or more idea distances and one or more ideas; a converting logic to convert the text equivalent by implementing one or more conversion rules, wherein a conversion rule comprising one or more rule specifications; and an outputting logic to electronically display on the monitor an audit diagram comprising the text equivalent constructed from the input text, and a conversion representation comprising an operator indicator and a result arrow. |
20070109297 | 11341180 | 0 | 1. A system for providing a dynamic user interface for a dense three-dimensional scene with a navigation assistance panel, comprising: a three-dimensional scene to logically hold clusters, each cluster comprising one or more concepts and arranged proximal to each other such cluster to form a cluster spine; a two-dimensional display to display each cluster spine projected relative to a stationary perspective; and a user interface, comprising: controls to operate on a view of the cluster spines in the display; a compass to logically frame the cluster spines within the display; a label to identify one such concept in one or more of the cluster spines appearing within the compass; a plurality of slots in the two-dimensional display positioned circumferentially around the compass, wherein each label is assigned to the slot outside of the compass for the cluster spine having a closest angularity to the slot; and a perspective-altered rendition of the two-dimensional display comprising the projected cluster spines and a navigation assistance panel framing an area of the perspective-altered rendition corresponding to the view of the cluster spines in the display. |
7954099 | 11436012 | 1 | 1. A method of providing for two levels of server virtualization comprising: providing a first level of virtualization by means of a first hypervisor enabling multiple logical partitions to share a set of resources of a server; providing a second level of virtualization by means of a second hypervisor enabling multiple, independent virtual machines to share said resources that are assigned to a single logical partition; grouping all events for all of the virtual machines within said single logical partition into a single partition-owned event queue for receiving event notifications from the shared resources for that single logical partition; and signaling the second hypervisor by generating an interrupt for the grouped events from the partition-owned event queue, the interrupt for demultiplexing grouped events from the partition-owned event queue into individual, virtualized event queues that are allocated on a per virtual machine basis. |
9282158 | 13153720 | 1 | 1. A method performed by one or more data processing apparatus, the method comprising: receiving, by one or more first servers operated by a first entity, request data indicating that a user device has requested a content item, identifying, by the one or more first servers and based on information specified by the request data, one or more other servers to which user interactions with the content item are to be reported, wherein the one or more other servers are operated by one or more other entities that differ from the first entity; providing, by the one or more first servers and to the user device, response data in response to the request data, the response data including data that cause presentation of the content item, wherein the response data includes a hyperlink specifying: a destination web page to which the user device will be redirected in response to user interaction with the content item; and one or more unique identifiers for each of the one or more other servers to which user interactions with the content item are to be reporter; receiving, from the user device, by the one or more first servers, and after providing the response data, interaction data specifying that user interaction with the content item occurred; providing, by the one or more first servers and to the user device in response to receiving the interaction data, redirect data that cause the user device to be redirected to the destination web page; identifying, in the interaction data and by the one or more first servers, the one or more unique identifiers for each of the one or more other servers; and providing, by the one or more first servers and based on the identified one or more unique identifiers, reporting data to each of the one or more other servers, the data specifying that the user interaction with the content item occurred, wherein providing reporting data comprises providing reporting data that include an encrypted shared unique identifier. |
20150227450 | 14663930 | 0 | 1. A method, comprising: setting, with a processor executing on a computer, one or more breakpoints in source code of a client application based on locations of Application Programming Interface (API) calls in the source code; and while running the client application through a debugger, upon reaching each of the one or more breakpoints, identifying one or more debugger rules associated with a query at a breakpoint; in response to determining that conditions of the one or more debugger rules are satisfied, obtaining a stack trace before the query makes a call to a database; and deriving query text of the query and a location of the query in source code of the client application. |
20130326526 | 13909287 | 0 | 1. An information processing apparatus for generating a workflow including one or more steps each indicating a process to be executed, the apparatus comprising: a workflow display unit configured to display, on a display, one or more graphical representations corresponding to one or more steps of the workflow; a step management unit configured to obtain attribute data associated with a step to be added in response to an instruction for adding the step to the workflow; and an auxiliary indication control unit configured to cause the display to display a graphical representation corresponding to the step to be added and a graphical representation that reflects the attribute data. |
8655704 | 13533845 | 1 | 1. A system comprising: processor means and memory means; means for identifying a market to target for an investment decision; means for identifying unmet customer needs based on jobs and outcomes; means for scoring competitive product or service offerings against the jobs and outcomes; means for scoring a solution based on the jobs and outcomes and the solution's ability to increase satisfaction; means for identifying willingness of a customer to pay to have a job completed with maximum satisfaction; means for calculating fixed and variable costs for the solution; means for determining if the solution can be delivered to create an investment rate of return (IRR) that meets an IRR threshold. |
20090254504 | 12098057 | 0 | 1. A method, comprising: generating a plurality of information technology solution alternatives for an enterprise organization; evaluating the plurality of information technology solution alternatives within an automated architectural framework based upon at least one information technology evaluation metric; creating an automated incremental solution deployment strategy based upon the evaluated plurality of information technology solution alternatives; and selecting an information technology solution from the plurality of information technology solution alternatives for deployment based upon the automated incremental solution deployment strategy. |
8234237 | 12467641 | 1 | 1. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for automatic return letter generation, the method comprising: determining whether a source document with contact information includes one or more fields requiring data; responsive to the determining, automatically generating a response document based on the required data; automatically generating a document identifier based on the contact information and the response document; transmitting the response document based on the contact information to a recipient; responsive to receiving response data from the recipient, matching the response data with the source document using the document identifier; electronically merging the response data with the source document to yield a merged document; and processing the merged document. |
7558031 | 10836357 | 1 | 1. A system for controlling an AC motor comprising: a motor controller comprising a motor control device and means for identifying an occurring fault and determining if said occurring fault is either a non-restricted fault or a restricted fault; an output contactor connected between said motor control device and said motor, said output contactor closed in the absence of any occurring fault; and a bypass contactor connected to said motor control device and connected also between a source of AC power and said AC motor, said bypass contactor open in the absence of any occurring fault; said motor controller first opening said output contactor upon said fault identifying means determining the occurrence of either a non-restricted fault or a restricted fault and then closing said bypass contactor only when said fault identifying means determine the occurrence of a non-restricted fault. |
20140100265 | 14029786 | 0 | 1. A method comprising: (a) identifying a subject that has or is at risk of developing Parkinson's disease; (b) contacting neurons in the substantia nigra in the subject with a therapeutically effective amount of a gene delivery vehicle comprising a gene hp70S6K(CA) identified by SEQ ID NO. 1 that encodes a constitutively active form of protein hp70S6K (delC/T389E) identified by SEQ ID NO. 2 or a biologically active form or variant thereof, in an amount that promotes axon regeneration in dopaminergic neurons of the substantia nigra, wherein the gene delivery vehicle is administered under conditions that permit transduction of the neurons with the gene delivery vehicle thereby treating the subject. |
20120089496 | 13154804 | 0 | 1. A method comprising: streaming data representative of a plurality of limit order events pertaining to a plurality of financial instruments into a coprocessor; processing the streaming data with the coprocessor to determine order book data associated with the limit order events; generating a stream of enriched limit order events with the coprocessor, wherein the enriched limit order events are enriched with data indicative of the determined order book data. |
9459992 | 14165541 | 1 | 1. A method of debugging a platform, said method comprising: detecting a breakpoint event of a simulator that is communicatively coupled to a debugger, the simulator comprising a first thread simulating the platform, a second thread implementing a first interprocess communication channel between the simulator and an embedded software debugger that is different than the debugger and a third thread implementing a second interprocess communication channel between the simulator and a component that is different than the debugger and different than the embedded software debugger and external to the simulator; blocking, using the debugger and responsive to detecting the breakpoint event, the first thread simulating the platform while allowing the second thread implementing the first interprocess communication channel to operate and allowing the third thread implementing the second interprocess communication channel to operate; and communicating using the second thread implementing the first interprocess communication channel and the third thread implementing the second interprocess communication channel while the first thread simulating the platform is blocked, the embedded software debugger accessing a state of the platform using the second thread during the communicating. |
9032316 | 13646631 | 1 | 1. A computer-implemented method for proposing actions to a user to select based on the value of the actions to the user, the method comprising: receiving content selected by a user from a device; identifying a plurality of actions to be executed that are associated with a referent entity identified from the selected content, wherein each action has an associated value to the user and wherein the associated value for at least two of the plurality of actions is a function of an estimated average amount of time it takes a user to manually perform each of the at least two actions; and providing, for display, an identifier of each of at least a subset of the actions based on their associated values. |
9411710 | 14672614 | 1 | 1. A method for testing a computer application, the method comprising: identifying, by a test server, components of a version of the application, said components including one or more components that are one of new and modified, wherein each of the one or more components corresponds to a keyword; generating, by the test server, a keyword matrix of the identified application components, the keyword matrix having a set of all identified application components as a first dimension and a set of the one or more components that are one of new and modified as a second dimension, wherein the keyword matrix comprises the keywords; performing, by the test server, a search in a test script repository with respect to components listed as at least one of the first and second dimensions, said test script repository including test scripts referencing at least some of the identified components, and determining a result of the search; populating, by the test server, the keyword matrix with test case identification numbers in the search result, the test case identification numbers corresponding to test scripts that refer to the at least some of the identified components of the application; and based on the populated keyword matrix, identifying, by the test server, one or more of (a) gaps in test case coverage for the version of the application, and (b) one or more test cases covering the version of the application. |
8244658 | 12434490 | 1 | 1. A method, comprising: receiving at a platform supporting applications built by third parties, at least one programming language instruction associated with at least one custom object, the at least one custom object including a table of a database; determining a shape for the at least one custom object based upon a runtime instance of the at least one custom object, the shape indicated by a number of rows and columns of the table; and generating, based on the at least one programming language instruction, a set of instructions to an on-demand database service, the set of instructions configured to operate upon the runtime instance of the at least one custom object based upon the shape; wherein the shape is determined utilizing one or more tokens; wherein each of the tokens indicates a row of the table and a type of the row of the table, and the one or more tokens are utilized for indicating the shape associated with the at least one custom object. |
20070050190 | 11324463 | 0 | 1. A voice recognition system comprising: a signal processing unit for converting inputted speech voice data into a feature; an acoustic model storing unit in which an acoustic model obtained by modeling what kind of feature a voice tends to become is stored in advance; a vocabulary dictionary storing unit in which information of a recognition vocabulary is stored in advance; a voice section detecting unit for detecting voice sections in the speech voice data according to a predetermined voice section criterion; a priority determining unit for selecting a voice section to be given priority from among the voice sections detected by the voice section detecting unit according to a predetermined priority criterion; a decoder for calculating a degree of matching with the recognition vocabulary using the feature of the voice section selected by the priority determining unit and the acoustic model; and a result output unit for outputting a word sequence having the best score in the matching by the decoder as a recognition result; wherein the priority determining unit uses as the predetermined priority criterion at least one selected from the group consisting of (1) a length of the voice section, (2) a power or an S/N ratio of the voice section, and (3) a chronological order of the voice section. |
20040123242 | 10731906 | 0 | 1. A system that facilitates the association of data with a user context, comprising: a data component that is associated with one or more data operations being performed on the data; and a tagging component that automatically tags contextual information to the data when the data is created. |
20050091197 | 10691308 | 0 | 1. A method for context-sensitive searching of fields of a data repository using multiple levels of term expansion, comprising: receiving, from a user, a query containing at least one condition for searching at least one field of the data repository, wherein the at least one condition includes at least one base search term; obtaining one or more parameters associated with the base search term; obtaining a level of expansion based on the one or more parameters associated with the base search term; obtaining, based at least in part on the level of expansion, one or more expanded search terms; and modifying the query to contain one or more conditions based on the one or more expanded search terms. |
9710606 | 15097862 | 1 | 1. A method for at least one of characterizing, diagnosing, and treating a neurological health issue in at least a subject, the method comprising: for each of an aggregate set of samples from a population of subjects: determining a microorganism nucleic acid sequence, comprising: identifying primers for nucleic acid sequences associated with the neurological health issue, fragmenting nucleic acid material from the biological sample, and amplifying the fragmented nucleic acid material using the identified primers; and determining an alignment of the microorganism nucleic acid sequence to a reference nucleic acid sequence associated with the neurological health issue; generating a microbiome composition dataset and a microbiome functional diversity dataset for the population of subjects based on the; receiving a supplementary dataset, associated with at least a subset of the population of subjects, wherein the supplementary dataset is informative of characteristics associated with the neurological health issue; transforming the supplementary dataset and features extracted from at least one of the microbiome composition dataset and the microbiome functional diversity dataset into a characterization model of the neurological health issue; based upon the characterization model, generating a therapy model configured to correct the neurological health issue; and at an output device associated with the subject, providing a therapy to the subject with the neurological health issue, upon processing a sample from the subject with the characterization model, in accordance with the therapy model, wherein the therapy modulates microbiome composition to improve a state of the neurological health issue. |
8117533 | 10095797 | 1 | 1. A computer implemented method of editing a set of rules contained in a rules document, said rules defining a transformation of data on an input document, said rules document and said input document having elements constructed in a tree structure having nodes, each said rule on said rules document having a template structure including at least one match condition, said match condition being an expression in said template that describes a subset of tree nodes, said method comprising: selecting at least one rule in said rules document; checking a match condition of said at least one selected rule with said tree nodes from said input document to determine which structures in said input document match said selected rule; merging any rules having an identical effect into a single rule; and presenting a listing by computer implementation of proposed rule modifications based on said determination of matching structures, in order to provide said edited set of rules for use in defining transformation of said input document to produce an output document. |
6105124 | 08672100 | 1 | 1. A method for use in a computer system, the computer system having a translator for translating instructions executable in a source instruction set Architecture into instructions executable in a target instruction set Architecture, the method comprising the steps of: a) the translator determining a probability of a first block of instructions following an order of execution to a second block of instructions, said probability consisting of a ratio of a taken counter and a used counter, said taken counter represents a number of times the first block of instructions follows the order of execution to the second block of instructions, and said used counter a number of times the first block of instructions has been executed; and b) in response to the probability exceeding a predetermined threshold, the translator generating a hyperblock of instructions representing the first and second block of instructions translated, and combined in the order of execution. |
20060026690 | 10845634 | 0 | 1. A system for preventing unauthorized use of a software program designed to be used with a device, where the software program and said device operate in the same host, comprising: a Production Key generation engine, the Production Key generation engine accepting as input one or more of a plurality of device-specific identifiers and a Software Product ID identifying said software program and providing therefrom a Production Key to the manufacturer of said device, said Production Key generation engine confidential to the manufacturer of said software program; a Locking Programming Interface (LPI) encoding engine, said LPI encoding engine accepting as input at least a portion of said device-specific identifiers, said Software Product ID and said Production Key and providing therefrom an LPI code which accompanies said device; and a Key Validation engine, said Key validation engine accepting as input at least a portion of said device-specific identifiers, said Software Product ID and said LPI Code and validating an extracted Private Key therefrom, wherein a successful validation enables features of said software program as specified by said Software Product ID to function in said host. |
8214375 | 12399247 | 1 | 1. A method for generating one or more groups of similar users of a software application, the method comprising: generating a first set of usage data associated with a first user of the software application; generating a second set of usage data associated with a second user of the software application; transmitting the first set of usage data and the second set of usage data to a server configured to generate a similarity value between the first user and the second user based on the first set of usage data and the second set of usage data; generating a similarity table that includes the similarity value and a plurality of additional similarity values generated between each user included in a set of users of the software application and each other user included in the set of users, wherein each user included in the set of users is associated with a different set of usage data that comprises a command frequency table of one or more commands issued by the user to the software application and, for each of the one or more commands, an indication of a frequency with which the command is issued by the user; placing the first user and the second user together into a first group based executing one or more clustering algorithms that use the similarity table as an input; and communicating to the first user that the first user and the second user are both in the first group. |
20130339404 | 13676264 | 0 | 1. A system for automatically translating and transforming a building architecture file format to a simulation file, comprising: an extract data module operable to extract from an input building architecture file, data and metadata used by a target simulation tool; a create interoperability data object module operable to create interoperability data objects and store the extracted data in the interoperability data objects; a prepare model translation procedure module operable to prepare a model translation procedure to identify a mapping from a Model View Definition to a translation and transformation function; a convert data module operable to transform the extracted data using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool; and a generate targeted output file module operable to generate the simulation file in the target simulation file format. |
20090171625 | 12348103 | 0 | 1. A data structure tangibly embodied on a computer readable storage medium, the data structure comprising: a plurality of measurement statement objects S representing a plurality of measurements M, wherein each of the plurality of measurement statement objects S n corresponds to a particular one of the plurality of measurements M n and comprises: a value object representing a value; an aspect object representing an aspect of the measurement M n , wherein the value is a value of the aspect of the measurement M n ; and an entity object representing a physical entity measured by the measurement M n , wherein the aspect of the measurement M n is a measurable aspect of the physical entity measured by the measurement M n . |
20160259817 | 15155864 | 0 | 1. One or more computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform a method, the method comprising: accessing social data from one or more social networking services; analyzing text of the social data to identify a plurality of online actions based on actions discussed by users in the text of the social data; analyzing the social data to identify at least one URL for each online action, each URL corresponding with a webpage at which a corresponding online action may be performed; and storing information regarding at least a portion of the plurality of online actions and corresponding URLs for providing deeplinks for search results. |
20090006933 | 11771424 | 0 | 1. A method executable in a computer system for determining changes to a directory schema, the method comprising: receiving a first selection of a first version of a directory schema; determining one or more changes between the first version of the directory schema and a second version of the directory schema; and providing the one or more changes. |
9087205 | 14051776 | 1 | 1. A method comprising: receiving, on a first computing device, a registration password, the registration password provided to a plurality of client instances for registering the client instances to participate in a secure storage facility on a shared data store, the secure storage facility implemented using a key encryption scheme; generating or receiving, on the first computing device, a first encryption key to be used in the key encryption scheme; calculating a key encryption key to be used to encrypt the first encryption key, the key encryption key calculated based at least in part on the registration password; encrypting the first encryption key with the key encryption key; creating a key element comprising the encrypted first encryption key; storing the key element on the shared data store; storing the key encryption key on a local persistent data store of the computing device; after storing the first encryption key on the shared data store, receiving, on a second computing device, the registration password; retrieving, on the second computing device, the key element that contains the first encryption key from the shared data store; retrieving, on the second computing device, a salt from an unencrypted segment of the key element; using, on the second computing device, the registration password and the salt to calculate the key encryption key; using, on the second computing device, a checksum retrieved from an unencrypted segment of the key element to verify the correctness of the received registration password; and storing, on the second computing device, the key encryption key in a local, persistent data store associated with the second computing device. |
20140019966 | 13549259 | 0 | 1. An infrastructure management system comprising: a server comprising a processor, a memory, and a set of program instructions stored in the memory; a target set of hosts and a target set of virtual machines for a destination computing system; wherein the processor executing the set of program instructions: determines a new placement of the target set of virtual machines on the target set of hosts, wherein the new placement comprises a set of virtual machine-host pairs from the target set of hosts and the target set of virtual machines; and, automatically reconfigures a source computing system into a destination computing system according to the new placement. |
8654649 | 13191840 | 1 | 1. A method, comprising: determining a current path cost in a routing topology from a particular node in a shared media communication network to a root node of the routing topology via a current parent node; determining, for each reachable potential parent node of the particular node, a respective path cost from the particular node to the root node via each potential parent and a respective link metric from the particular node to each potential parent node; determining a set of acceptable parent nodes selected from the potential parent nodes, wherein acceptable parent nodes have a respective path cost that is less than the current path cost plus a cost increase, and also have a respective link metric from the particular node that is within a link metric range; determining, for each acceptable parent node of the set, a respective number of child nodes of the corresponding acceptable parent node; and selecting a new parent node for the particular node in the routing topology based on giving preference to acceptable parent nodes having a greater respective number of child nodes. |
8621451 | 13354205 | 1 | 1. A computing device configured for improving responsiveness in connection with software distribution, comprising: a processor; memory in electronic communication with the processor; instructions stored in the memory, the instructions being executable to: send a software package to a remote computing device to be installed on the remote computing device; receive a return code and package information from the remote computing device in response to the computing device sending the software package to the remote computing device; look up a code mapping in a cache, wherein the code mapping is based on the return code; store the package information in a database; and display the code mapping and the package information. |
7552318 | 11016200 | 1 | 1. A microprocessor which commits results of non-speculative instructions to at least one architected facility, comprising: multiple execution units; architected registers which store operand data used by said execution units; dispatch logic which detects the occurrence of a stall condition during execution of program instructions by said execution units, speculatively executes one or more pending instructions which include at least one branch instruction during the stall condition, determines the validity of data utilized by the speculative execution, and maintains a vector of dirty bits to track the validity of the pending instructions, wherein dirty bits in the vector are initially set to β0β and a given one of the dirty bits is set to β1β when a corresponding instruction passes a writeback stage where a result calculated by one of said execution units is provided to one of said architected registers; an instruction queue; and a branch prediction unit which predicts a path of the branch instruction prior to said detecting of the occurrence of the stall condition, and fetches predicted instructions from the predicted path into said instruction queue, wherein said dispatch logic speculatively flushes the predicted instructions from the instruction queue in response to said executing of the branch instruction when the dirty bit for the branch instruction is set to β0β. |
20100042956 | 12191926 | 0 | 1. An integrated circuit to support multi-media processing of image data, comprising: a scalable clustered memory storage subsystem including: a set of memory clusters and a hub to support inter-cluster memory traffic between individual memory clusters in the group of memory clusters and traffic with an external interface; each individual memory cluster having an intra-cluster bus, a set of storage devices coupled to the intra-cluster bus, and access arbitration logic to control access to the set of storage devices; and a high bandwidth interface to couple read/write ports of the scalable clustered memory storage subsystem to a set of processing units for parallel multi-media processing; wherein a baseline design of the scalable clustered memory storage subsystem has the hub, intra-cluster buses, and read/write ports capable of supporting a range of memory clusters up to a maximum number of memory clusters with the memory capacity chosen prior to fabrication by selecting the number of memory clusters in the set of memory clusters that are fabricated into the integrated circuit. |
20170295258 | 15416377 | 0 | 1. (canceled) |
8356164 | 12495643 | 1 | 1. A method for generating a result vector with shifted values from an input vector, comprising: receiving the input vector and a control vector, and optionally receiving a predicate vector, wherein each vector includes N elements; and generating the result vector, wherein generating the result vector involves, if the predicate vector is received, for each element in the result vector to the right of a key element position for which a corresponding element in the predicate vector contains a non-zero value, otherwise, for each element in the result vector to the right of the key element position: if an element at a first element position in the control vector to the left of the element in the result vector contains a non-zero value, setting the element in the result vector equal to a value contained in an element at the first element position in the input vector to the left of the element in the result vector; otherwise, if the element at the first element position in the control vector to the left of the element in the result vector contains a zero, setting the element in the result vector equal to a value from a rightmost element of the input vector to the left of the element of the result vector where a corresponding element of the control vector contains a non-zero value. |
9446239 | 13794359 | 1 | 1. A neurostimulation system, comprising: at least one lead to provide an array of electrodes; a plurality of electrical terminals configured to be electrically connected to the array of electrodes via the at least one lead; at least three configurable sources respectively coupled to at least three of the electrical terminals, each of the configurable sources including a current source and a voltage source and each of the configurable sources being capable of being programmed to operate as the current source and being capable of being programmed to operate as the voltage source; and control circuitry configured for programming each of the at least three configurable sources to be either the current source or the voltage source, wherein the control circuitry is configured to: program at least one of the configurable sources to operate as the current source and to connect the current source to at least one electrode in the array of electrodes to generate a current distribution in neural tissue; and program at least one other of the configurable sources to operate as the voltage source and to connect the voltage source to at least one other electrode in the array of electrodes to shape the current distribution. |
9530174 | 14503311 | 1 | 1. A non-transitory machine-readable medium having executable instructions to cause one or more processing units to perform a method to manage a thermal profile of a device, the method comprising: monitoring thermal data of the thermal profile of the device, the device is executing a plurality of processes that utilize a graphics processing unit (GPU) of the device, the plurality of processes including a high priority process and a low priority process; if the thermal data of the device exceeds a first thermal threshold, decreasing a first GPU utilization for the low priority process, and maintaining a second GPU utilization for the high priority process; executing the low priority process using the first GPU utilization with the GPU; and executing the high priority process using the second GPU utilization with the GPU, wherein the first GPU utilization is different from the second GPU utilization after the thermal data of the device exceeds a first thermal threshold and the first and second GPU utilizations are each a different percentage of a maximum GPU frequency. |
20120047511 | 12857736 | 0 | 1. A method for throttling storage initialization for data destage in a computing storage environment by a processor device, comprising at least one of: performing an implicit throttling operation by limiting a finite resource of a plurality of finite resources available to a background initialization process, the background initialization process adapted for performing the storage initialization ahead of a data destage request, wherein if a predefined percentage of the plurality of finite resources is utilized, at least one of the plurality of finite resources is deferred to a foreground process that is triggered by the data destage request, the foreground process adapted to perform the storage initialization ahead of a data destage performed pursuant to the data destage request; and performing an explicit throttling operation by examining a snapshot of storage activity occurring outside the background initialization process, wherein if the storage activity exceeds a predetermined level: the storage initialization is at least one of limited to one of a predetermined number of portions and size of the storage per a predetermined time, and a delay is injected into the background initialization process. |
20030212760 | 10142625 | 0 | 1. A method for modeling a user intention during network navigation, the method comprising: predicting, based on a statistical multi-step n-gram probability model, an optimal information goal of the user; and wherein the optimal information goal is based on a sequence of previously visited network content pieces and a globally optimized navigation path through the sequence. |
8099735 | 11962949 | 1 | 1. A method for initializing a module comprising: identifying a module for initialization, wherein the module is dependent on a plurality of modules and wherein the plurality of modules is listed in a dependency graph of the module; and performing a plurality of processing phases on the module and the plurality of modules in the dependency graph, wherein the performing comprises, for each module: executing a processing phase of the plurality of processing phases on the module; determining whether the processing phase has been executed on each of the plurality of modules in the dependency graph of the module, wherein determining whether the processing phase has been executed comprises walking the dependency graph of the module to determine an initialization status of each of the modules in the dependency graph, wherein the initialization status indicates which processing phase of the plurality of processing phases was last performed on a module; and when the processing phase has been executed on each of the modules in the dependency graph of the module, executing a subsequent processing phase of the plurality of processing phases on the module, wherein at least one processing phase of the plurality of processing phases comprises executing custom initialization code. |
9800673 | 14464283 | 1 | 1. At least one memory resource that stores instructions that, when executed by a cloud computing system, cause the cloud computing system to perform operations comprising: receiving compiler data associated with a new Open Systems Interconnection communication model layer 4 through layer 7 service provided by a service provider, the compiler data comprising a service data model file comprising a pointer to a virtual network function to be used to instantiate the new Open Systems Interconnection communication model layer 4 through layer 7 service, the compiler data further comprising at least one of a business policy associated with the new Open Systems Interconnection communication model layer 4 through layer 7 service and specific to the service provider or an engineering rule associated with the new Open Systems Interconnection communication model layer 4 through layer 7 service and specific to the service provider; analyzing the compiler data at least to determine the virtual network function to be used to instantiate the new Open Systems Interconnection communication model layer 4 through layer 7 service and to determine a constraint of the new Open Systems Interconnection communication model layer 4 through layer 7 service based on at least one of the business policy specific to the service provider or the engineering rule specific to the service provider; generating, based at least in part on analyzing the compiler data, a template for the new Open Systems Interconnection communication model layer 4 through layer 7 service, the template identifying the virtual network function to be used to instantiate the new Open Systems Interconnection communication model layer 4 through layer 7 service and further identifying how, based at least in part on the constraint of the new Open Systems Interconnection communication model layer 4 through layer 7 service, to instantiate the new Open Systems Interconnection communication model layer 4 through layer 7 service; receiving the template for the new Open Systems Interconnection communication model layer 4 through layer 7 service; requesting that a resource orchestrator create the virtual network function in accordance with the template; alerting a virtual network function controller to the virtual network function created by the resource orchestrator; and interacting with a virtual network function adapter to configure and manage the virtual network function. |
20100067814 | 12626409 | 0 | 1. A method of operating processing hardware, the method comprising: (a) accepting image data represented by an ordered series of digital signals representing a block of quantized coefficients of a transformed block of image data, the quantized transform coefficients each having a respective value, including a respective amplitude from a finite set of amplitudes consisting of the most likely-to-occur amplitude and at least one other amplitude, the at least one other amplitude including the second-most likely-to-occur amplitude; (b) using a position event identifying method executing on the processing hardware to identify position events that each include a cluster of at least one consecutive signal having any amplitude other than the most likely-to-occur amplitude, such that the position events define the relative positions and runlengths of the clusters and of any intervening runs of consecutive coefficients having the most likely-to-occur amplitude; (c) using an amplitude event identifying method executing on the processing hardware to identify the amplitudes of the signals having amplitudes other than the most likely-to-occur amplitude; and (d) encoding the identified position events and encoding the identified amplitude events by respective codewords, and encoding the signs of the amplitudes other than the most likely-to-occur amplitude in the identified amplitude events, such that for at least some of the identified position events and identified amplitude events, events containing a cluster of signals having more likely-to-occur signal amplitudes other than the most likely-to-occur amplitude are encoded by shorter codeword(s) than are events containing a cluster of signals having less likely-to-occur signal amplitudes other than the most likely-to-occur amplitude; and (e) outputting the codewords formed by the encoding, wherein the position event identifying method uses Cluster Runlength Identifying and the amplitude event identifying method uses Multi-Table Amplitude Event Identifying, Cluster Runlength Identifying including identifying events of a first kind, each event of the first run including a run of consecutive signals having the second-most-likely-to-occur amplitude, and identifying events of a second kind, each event of the second kind being a run of consecutive signals having the most likely-to-occur value, Multi-Table Amplitude Event Identifying including in each run of consecutive signals of value or values having other than the most-likely-to-occur amplitude, identifying amplitude events of at least one consecutive signal, an identified amplitude event including a sequence of at least one consecutive signal having the next most likely-to-occur amplitude that ends in a signal having other than the second-most likely-to-occur amplitude, or ascertaining that the amplitude event has only a signal having other than the second-most likely-to-occur amplitude, or ascertaining that the amplitude event has only a sequence of consecutive signals having the second-most likely-to-occur amplitude, each identified amplitude event defined by the length of the run of consecutive signals of amplitude value or values other than the most-likely-to-occur amplitude, the length of the sequence of at least one consecutive signal having the second-most likely-to-occur amplitude, and by the amplitude of the last signal in the run, the third amplitude event identifying method including, in each run of consecutive signals of value or values having other than the most-likely-to-occur amplitude, identifying amplitude events of a single signal having other than the most-likely-to-occur amplitude, or wherein the position event identifying method uses 2-D Cluster Length and Position Identifying, 2-D Cluster Length and Position Identifying including identifying position events that each includes a run of one or more consecutive signals having other than the most-likely-to-occur amplitude preceded by either no signals having the most-likely-to-occur amplitude, or a run of one or more consecutive zero-valued signals having the most-likely-to-occur amplitude, each position event identified by the runlengths of the preceding run of consecutive zero-valued signals having the most-likely-to-occur amplitude, including a runlength of 0, and the runlength of the run of consecutive signals having other than the most-likely-to-occur amplitude. |
8990827 | 13646662 | 1 | 1. A method for managing a processor and one or more co-processors for a database application whose queries have been processed into an intermediate form (IR) containing operators of the database application that have been fused and split and consisting of multiple co-processor kernels, comprising: dynamically scheduling the fused and split operators to co-processor streams; and dynamically dispatching the co-processor kernels of the fused and split operators to selected streams; applying a scheduler to a list of the fused and split operators with relational algebra (RA) in a database query plan, wherein RA operators are used to express the high level semantics of an application in terms of a series of bulk operations on relations and wherein each operator includes kernels that are intercepted and wherein the scheduler first selects the oldest operator and inserts the operator into a scheduling list; allocating an available co-processor stream from the pool to the operator and adding operators to the scheduling list until the scheduling list is full and thereafter issuing individual co-processor kernels to the co-processor stream. |
7890875 | 11402139 | 1 | 1. A method of instant messaging (IM) conversation management in a communication apparatus comprising: maintaining a first list of at least one IM conversation in a graphical user interface (GUI) for engaging in a plurality of IM conversations; monitoring conversation activity for the IM conversations in the first list; automatically removing a particular IM conversation from the first list in response to the conversation activity monitored, the particular IM conversation being automatically removed after an idle period of conversation activity and only if all messages of the particular IM conversation are read; archiving the particular IM conversation to an IM conversation archive for making the particular IM conversation accessible via the GUI; and providing a second list of at least one archived IM conversation in said GUI separate from said first list for accessing archived conversations of the IM conversation archive. |
20110313961 | 13140014 | 0 | 1. A method of routing data through a router in a communications network, the method comprising: receiving one or more data packets, each packet having a respective destination address; applying a lookup algorithm to each packet, said lookup algorithm being arranged to determine a respective route along which each packet is to be transmitted towards its destination address by searching an associated hierarchical data structure containing routing information for each packet; and forwarding each packet for transmission to its respective destination address, wherein said lookup algorithm comprises an adaptive learning component that is configured to dynamically identify an optimum starting position for searching within said hierarchical data structure, for each of the data packets, based on the results of one or more earlier searches. |
8700765 | 12855828 | 1 | 1. A method for monitoring application performance in a networked device, the method comprising: collecting performance data using at least one kernel space driver interface, the collected performance data corresponding to at least one application running on the networked device; generating a plurality of kernel level metrics and/or a plurality of user level metrics based on the collected performance data; generating, after generating the plurality of kernel level metrics, an event incorporating at least one of the plurality of kernel level metrics and at least one of the plurality of user level metrics; and aggregating ones of the plurality of kernel level metrics and/or ones of the plurality of user level metrics that were generated during a predefined time interval, wherein said collecting performance data, generating a plurality of kernel level metrics and/or a plurality of user level metrics, and generating an event comprise operations performed using at least one programmed computer processor circuit, wherein the predefined time interval is in a range from about 1 second to about 60 seconds; and wherein collecting performance data comprises: collecting a first portion of performance data from an operating system internal kernel interface that provides an interface between a network protocol and a network protocol client; and collecting a second portion of performance data from an application oriented system call interface to a transport network stack. |
20140025895 | 13947561 | 0 | 1. A method for providing parallel computing of a computing application on a computing device having a plurality of caches, the computing application having a plurality of threads to be executed, the method comprising: executing, in parallel using a set of the plurality of caches, a set of the plurality of threads, the set of caches containing less than all of the plurality of caches, and the set of threads containing a number of the plurality of threads that can be executed using the set of caches; and executing, in parallel using the one or more caches that are not in the set of caches, the threads that are not in the set of threads. |
8782197 | 13551236 | 1 | 1. A computerized method for determining a model refresh rate for a model representing a list of network user identifiers, the method comprising: receiving, at a processing circuit, a first model representing the list of network user identifiers at a first time and a second model representing the list of network user identifiers at a second time, wherein the first time is prior to the second time; calculating, by the processing circuit, a level of similarity between the first model and the second model; comparing, by the processing circuit, the level of similarity to a threshold value; and determining, by the processing circuit, the model refresh rate for the list of network user identifiers based in part on a comparison between the level of similarity and the threshold value, wherein if the level of similarity is less than the threshold value, the model refresh rate is a predetermined rate. |
8516033 | 13180164 | 1 | 1. A personal computer configured for use by at least one individual user, said computer comprising: at least a primary internal hardware firewall configured to protect a hardware protected side of the computer's hardware from a network side that is not protected by said primary internal hardware firewall, at least one microprocessor and at least a non-volatile memory is located within said hardware protected side; one or more network side microprocessors with at least a volatile memory and at least one network communications component are located within said network side, said network side being configured for connection to the network of computers and being located between said primary internal hardware firewall and a wired or wireless network connection to said network of computers; said one or more network side microprocessors being separate components from said at least one network communications component, and both said network side microprocessors and said at least one network communication component being separate from said primary internal hardware firewall; said primary internal firewall by its internal location not restricting access by the network to the network side, thereby not restricting the network operations of the computer, which are conducted in said network side using said network side microprocessors; at least a first secondary interior hardware firewall configured to form a first separate hardware protected compartment located in said hardware protected side; and at least one hardware protected side microprocessor with at least a non-volatile memory is located in said first separate hardware protected compartment located in said hardware protected side. |
9436724 | 14059380 | 1 | 1. A computer-implemented method for migrating data in a database, comprising: identifying a first update to one or more data entries of a source table; in response to identifying the first update, determining that a status of a trigger associated with the source table indicates to update a logging table, and in response: updating, in a first transaction and based on the first update, (i) the one or more data entries of the source table, and (ii) one or more data entries of the logging table, and copying content of the source table to a target table; identifying a second update to one or more data entries of the source table; in response to identifying the second update, determining that the status of the trigger associated with the source table indicates to update the target table, and in response: updating, in a second transaction and based on the second update, (i) the one or more data entries of the source table and (ii) one or more data entries of the target table, updating the content of the target table based on the one or more data entries of the logging table, and determining that the source table and the target table are in-sync based on the updates to the target table; identifying a third update to one or more data entries of the source table; and in response to identifying the third update and based on determining that the source table and the target table are in-sync, updating, in a third transaction and based on the third update, one or more data entries of the target table, wherein the first transaction and the second transaction occur in parallel, and copying the content of the source table to the target table includes excluding one or more data entries from the source table to the target table that are being transferred during the second transaction. |
10114554 | 15249627 | 1 | 1. A method for use in a computer system having a hierarchical memory system with at least first and second memory tiers, the first memory tier being faster than the second memory tier, the method enabling more data to be stored in the first memory tier so as to be more quickly accessed by a processor, the method being performed by a processor and comprising: performing an operation with two operands to determine an initial result of the operation, each operand being associated with a sensitivity value, wherein each sensitivity value indicates a number of bits of at least a portion of an associated data value that are not garbage bits, and wherein the initial result is computed without regard to the sensitivity value of either of the operands; determining a sensitivity value for a final result based at least on the sensitivity values of each of the operands; developing the final result as a function of the initial result and the determined sensitivity value for the final result; compressing only that portion of the final result that does not correspond to garbage bits as indicated by the sensitivity value of the final result; and storing the compressed final result and a representation of its sensitivity value in the first memory tier. |
20060129680 | 11267936 | 0 | 1. A method for organizing data records in a memory in a mobile telecommunication terminal comprising: receiving contact information in the mobile telecommunication terminal, the information identifying a subscriber contact in a telecommunication network; receiving or identifying a language tag associated with the contact information; storing the contact information and language tag in a memory of the mobile telecommunication terminal; and associating the language tag with at least one dictionary stored in the memory corresponding to the language tag via a control unit in the mobile telecommunication terminal, and associating the contact information with the dictionary. |
20140277786 | 14290570 | 0 | 1. An apparatus for electric power grid communication comprising: an active grid element having a function or a participation within an electric power grid, the active grid element constructed and configured within a housing for electrical connection and IP-based network communication with a server associated with the electric power grid; wherein the active grid element is automatically and/or autonomously updated and is operable to transmit or receive an update message with the server; wherein the update message, if received by the at least one grid element from the server, transforms the function or the participation of the active grid element within the electric power grid by updating at least one attribute of the active grid element; wherein the update message, if transmitted to the server, includes information about the at least one updated attribute; wherein the at least one attribute of the active grid element is selected from a revenue grade metrology for the active grid element, capacity or demand of the active grid element, security of the active grid element, settlement of the active grid element for its participation in the electric power grid, an active grid element profile, and combinations thereof; and wherein the at least one attribute of the active grid element corresponds to the function or the participation of the active grid element. |