Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


06th week of 2014 patent applcation highlights part 75
Patent application numberTitlePublished
20140040809SYSTEM AND METHOD FOR INPUTTING CHARACTERS ON SMALL ELECTRONIC DEVICE - A system and method for the inputting of characters for processing by very small electronic devices based on correlated movement of such a device by the user to access groupings of certain characters and the subsequent choice by said user of the proper character to be entered by touch screen input. In the preferred embodiment each of the twenty six letters of the Roman alphabet are intelligently marshaled into a default grouping and three selectable groupings, each of which being easily accessible by a user simply by moving the electronic device in a prescribed manner.2014-02-06
20140040810ELECTRONIC DEVICE AND METHOD OF CHANGING A KEYBOARD - A method includes, on a display of an electronic device, displaying a first virtual keyboard of a set of available virtual keyboards, detecting a touch, when the touch is associated with a keyboard changing function, displaying previews of virtual keyboards of the set of available virtual keyboards, detecting selection of a second virtual keyboard of the set of available virtual keyboards, and displaying the second virtual keyboard in response to detecting the selection.2014-02-06
20140040811UNIFIED PICTURE ACCESS ACROSS DEVICES - A method for creating a design for an image product includes registering a group of image sources by a network based image service system, wherein the group of image sources comprise a first device and a second device, receiving a notification, by the network based image service system, from the image sources about availabilities of the image sources, representing the second device and a local storage of the first device at a user interface on the first device, indicating an availability status of the second device on the first device, and if the availability status of the second device indicates that the second device is available, allowing a user to browse, on the first device, images stored on the second device.2014-02-06
20140040812SYSTEM AND METHOD FOR USER MODIFICATION OF METADATA IN A SHELL BROWSER - A system and method for user modification of metadata in a shell browser. A group of items and associated metadata values are displayed in a window of the shell browser. An edit control permits user modification of metadata values displayed in the window. The user can modify metadata associated with a welcome pane, a selected item, or multiple selected items. A data structure stored on one or more computer-readable media contains metadata associated with items displayed in a shell browser, including user modifiable metadata which is also displayed in the shell browser.2014-02-06
20140040813METHOD AND SYSTEM FOR DISPLAYING SEARCH RESULTS - Methods and systems related to the display of primary and secondary search results are provided. Search results are displayed to the user without requiring the user to perform any tasks to view the entire set of search results. The user may then request secondary searches based on the displayed primary search results through performing a single action. Secondary search results are displayed along with the primary search results.2014-02-06
20140040814SINGLE PAGE MULTI-TIER CATALOG BROWSER - A single page multi-tier catalog browser interface page is presented in a view formatted in response to a selection of a primary filter. The view displays a graduated element for selecting a primary filter value, and a matrix of secondary filter Yes or No indicators, each associated with the graduated element primary filter values, the Yes indicators aligned with the primary and secondary filter values that match within at least one record in a catalog. Selection of a graduated element value causes aligned Yes matrix indicators to be presented as selectable first-click icons in the interface page. Selection of a first-click icon expands it into a tertiary sub-window within the interface page, wherein selection thereof effects a layered primary-secondary-tertiary value searching of the catalog. Each of the above is achieved without navigating the user away from the single interface page.2014-02-06
20140040815BROWSING AND INTERACTING WITH OPEN WINDOWS - Methods, systems, and computer-readable media for managing open windows in a desktop GUI are disclosed. In various implementations, within a three-dimensional desktop, the open windows can be displayed in a three-dimensional browsable parade. As the user browses through the open windows in the browsable parade, the open window passing through a designated primary location of the three-dimensional desktop becomes the current active window of the desktop. An application menu bar of the current active window can be displayed on the three-dimensional desktop. The application menu bar and the active window together provide the full range of interactive capabilities that the native application environment of the open window would allow, even though the open window is currently displayed within the browsable parade.2014-02-06
20140040816ELECTRONIC PICTURE FRAME AND IMAGE DISPLAY METHOD THEREOF - An electronic picture frame and an image display method thereof are provided. In the electronic picture frame, a plurality of images are arranged and displayed on one side of a screen, and among the plurality of images, an image at a particular position is enlarged and displayed. Alternatively, a screen is divided into a plurality of sub-screens, so images stored in each of a plurality of storage areas can be displayed on a respective sub-screen. Accordingly, the images stored in the plurality of storage areas can be displayed on the electronic picture frame in diverse forms.2014-02-06
20140040817VISUAL TREATMENT FOR A TILE-BASED USER INTERFACE IN A CONTENT INTEGRATION FRAMEWORK - In a method, system, and computer-readable medium having instructions for a visual treatment for a user interface in a content integration framework, information is received on a tile size for a matrix of tiles and the matrix has one or more tiles with the tile size displayed on a user interface, one or more content images is received for display on the user interface, a position is determined within a first tile of the matrix for rendering a first content image from the one or more content images, a first area of excess space is determined within the tile after positioning the first content image within the first tile and the first area of excess space is dependent on at least one of an aspect ratio of the first content image and a size of the first content image, a reflection of the first content image is rendered within at least a portion of the first area of excess space within the first tile, the first content image is rendered within the first tile of the matrix, and descriptive text associated with the first content image is displayed so that the descriptive text overlays the reflection and not the first content image.2014-02-06
20140040818CONTROLLED INTERACTION WITH HETEROGENEOUS DATA - A two-dimensional canvas contains objects of various types. The two-dimensional canvas is fixed in one dimension, but extensible in a second dimension. The canvas is displayed in miniaturized form at the same time at least a portion of the canvas is displayed in another view, such as an edit view. Selection or modification of an object in the miniaturized version of the canvas will also result in a modification or selection of the corresponding object in the other view.2014-02-06
20140040819METHODS AND SYSTEMS FOR MANAGING THE PRESENTATION OF WINDOWS ON A DISPLAY DEVICE - Techniques for sizing, positioning and generally managing the display of windows are described herein. Consistent with some embodiments, a group of windows are assigned a position to form an ordered list, or sequence, of windows. The windows are then positioned and sized, based at least in part on their position in the sequence, and presented in accordance with a window layout that specifies that the first window in the sequence is to be positioned prominently as a primary window. Upon detecting a user-input event, the windows are reordered according to an ordering rule, and then presented again in the window layout, sized and placed in accordance with their position in the reordered sequence.2014-02-06
20140040820RE-SIZING USER INTERFACE OBJECT ON TOUCH SENSITIVE DISPLAY - A resizable user interface object on a touch sensitive display is resized based on detection of first and second contacts at first and second locations on the touch sensitive display. The object is resized based on detection of relative movement of the first and second contacts.2014-02-06
20140040821Zooming Method - A method of zooming in a graphical user interface of an electronic device (2014-02-06
20140040822MOBILE TERMINAL HAVING TOUCH SCREEN AND FUNCTION CONTROLLING METHOD OF THE SAME - A method for providing a graphical user interface on a display of a device includes: displaying a photograph image on the display of the device; receiving a touch input made on the display; superimposedly displaying a plurality of control guides at a location corresponding to the touch input over the displayed photograph image in response to the touch input; receiving a drag input corresponding to one of the plurality of control guides displayed on the display; adjusting a display characteristic of the photograph image corresponding to the one of the plurality of control guides, in response to the drag input; and displaying the photograph image having the adjusted display characteristic on the display, wherein the display characteristic is a magnification of the photograph image.2014-02-06
20140040823METHOD AND DEVICE FOR MULTI-WINDOW BROWSING - Multi-window browsing methods and devices are disclosed. A target-object selection control command can be received by a multi-window browsing device. The target-object selection control command can be issued according to each of one or more target objects selected to be added to a multi-window browsing interface. The multi-window browsing device can determine whether a number of the one or more target objects reaches a preset value and can start the multi-window browsing interface to simultaneously display the one or more target objects on the multi-window browsing interface, when the number of the one or more target objects is determined that reaches the preset value. An exemplary multi-window browsing device can include a receiving unit, a determining unit, and a display unit.2014-02-06
20140040824SYSTEMS AND METHODS FOR DATA NAVIGATION - A system and method for data navigation are disclosed. One method comprises defining a bounded portion or region of data and defining a navigation rule for the bounded portion of data, wherein the navigation rule defines a movement of an indicator relative to the bounded portion.2014-02-06
20140040825INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND PROGRAM - An information processing apparatus and method for controlling the information processing apparatus includes creating instructions corresponding to processing for transmitting image data to an apparatus identified by a URL, obtaining icon data based on the URL, and setting the obtained icon data as an icon of the created instructions.2014-02-06
20140040826METHOD FOR OPERATING SCREEN AND ELECTRONIC DEVICE THEREOF - A system supports quick selection and positioning of an application by detecting a touching operation in a predetermined region, mapping the detected touching operation to a corresponding region of the destination page, and selecting the icon of the application on the corresponding region. A screen operation device using the system, comprises a display module for displaying an operation interface, an input module for collecting user operation information and generating operation data, and a selection engine module.2014-02-06
20140040827INFORMATION TERMINAL HAVING TOUCH SCREENS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information terminal which is capable of moving an image, which is displayed on a display, in an efficient and intuitive manner. The information terminal has a first touch screen combined with the display, and a second touch screen. Among a plurality of images displayed on the display, an image corresponding to a position touched by a user on the first touch screen is selected. When the user performs an operation for scrolling the plurality of images on the second touch screen, a plurality of other images other than the selected image among the plurality of images are scrolled.2014-02-06
20140040828METHOD AND SYSTEM FOR TAGGING INFORMATION ABOUT IMAGE, APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM THEREOF - A method and a system for tagging information about an object included in an image to the image, and searching for the image by using the tagged information, and an apparatus and a computer-readable recording medium thereof. The method includes: detecting at least one object included in a displayed image, receiving, from a user, information about the detected object, and tagging the received information to the displayed image.2014-02-06
20140040829DETERMINING ACTIVE REAL OBJECTS FOR RUNNING A SOFTWARE APPLICATION - A communication terminal (T) equipped with a means of processing (TRT) designed to allow the use of software applications and equipped with an interface (INT) for communicating with a communication network (N), said means of processing comprising at least: •A first module (MZG) designed to delimit a geographical zone (ZG) based on a curve described in space by the communication terminal, •A second module (MOR) designed to determine a set of active real objects (O2014-02-06
20140040830USER INTERFACE - STATUS BAR - A method for controlling a domestic appliance, said domestic appliance having a display with a first portion and a second portion, a controller, and at least one user input component, the method comprising: displaying a menu in the first portion, detecting user input associated with a first parameter of said menu with the at least one user input component, displaying a first submenu in the second portion, detecting user input associated with a first parameter value of said first submenu with the at least one user input component, displaying the first parameter value in the menu in the first portion, and displaying a second submenu associated with a second parameter in the second portion.2014-02-06
20140040831DISPLAY CONTROL DEVICE, DISPLAY CONTROL METHOD, AND PROGRAM - The present technique relates to a display control device, a display control method, and a program that are capable of making inputtable gesture motions easy to notice. A display control unit causes a display unit to display a gesture motion guide in a first state. When a detecting unit for detecting gesture motions detects a predetermined gesture motion, the display control unit changes the guide corresponding to the detected gesture motion to a second state and then causes the display unit to display the guide. The technique according to this disclosure can be applied to an information processing terminal that includes a display unit, for example.2014-02-06
20140040832SYSTEMS AND METHODS FOR A MODELESS 3-D GRAPHICS MANIPULATOR - One aspect provides a modeless manipulator for interacting with and manipulating virtual objects located in 3-D space, in applications such as CAD. The modeless manipulator provides user interface elements that can be accessed by a user to effect any interaction relevant within the current display of the 3-D object. Examples of such interactions include scaling, rotation and translation in any of the three coordinate directions, scaling in all three coordinate directions, orbital rotations, and translation in screen space. The user interface elements of the manipulator are rendered so to ease usage of the manipulator on small form factor displays and with machines that lack mouse and stylus as mechanisms for user input. These aspects can be embodied in such machines, which can perform processes that are determined according to tangible machine readable media storing machine executable instructions describing such processes.2014-02-06
20140040833EDGE-AWARE POINTER - A machine with a display screen may provide a user interface with an edge-aware pointer (e.g., an edge-aware cursor). This pointer may be edge-aware in the sense that the machine may reorient the pointer based on the pointer being moved (e.g., according to input received from a user) near one or more edges of the display screen. The machine may provide a pointer in the form of an offset pointer that is automatically rotated to a new orientation based on the pointer being moved within a threshold distance from the edge of the display screen. Hence, the pointer may enable a user to precisely position the pointer and precisely indicate any location on the display screen, regardless of proximity to any edge of the display screen.2014-02-06
20140040834User Interface with Selection Patterns - Example embodiments relate to a user interface. In particular, example embodiments are drawn to a user interface associated with a touch sensitive screen. Example embodiments are also drawn to a computer readable medium configured to generate a selection pattern upon which a pointer may be moved to at least one representation, track a movement of the pointer on the selection pattern, and generate a new selection pattern in response to the pointer being moved to the at least one representation.2014-02-06
20140040835ENHANCED INPUT USING RECOGNIZED GESTURES - A representation of a user can move with respect to a graphical user interface based on input of a user. The graphical user interface comprises a central region and interaction elements disposed outside of the central region. The interaction elements are not shown until the representation of the user is aligned with the central region. A gesture of the user is recognized, and, based on the recognized gesture, the display of the graphical user interface is altered and an application control is outputted.2014-02-06
20140040836GRADED DUMMY INSERTION - Among other things, one or more techniques for graded dummy insertion and a resulting array are provided herein. For example an array is a metal oxide semiconductor (MOS) array, a metal oxide metal (MOM) array, or a resistor array. In some embodiments, a first region and a second region are identified based on a density gradient between a first pattern density associated with the first region and a second pattern density associated with the second region. For example, the first pattern density and the second pattern density are gate densities and/or poly densities. To this end, a dummy region is inserted between the first region and the second region, the dummy region includes a graded pattern density based on a first adjacent pattern density and a second adjacent pattern density. In this manner, graded dummy insertion is provided, thus enhancing edge cell performance for an array, for example.2014-02-06
20140040837METHOD OF OPTICAL PROXIMITY CORRECTION ACCORDING TO COMPLEXITY OF MASK PATTERN - A method of optical proximity correction (OPC) includes the following steps. At first, a layout pattern is provided to a computer system. Subsequently, the layout pattern is classified into at least a first region and at least a second region. Then, several iterations of OPC calculations are performed to the layout pattern, and a total number of OPC calculations performed in the first region is substantially larger than a total number of OPC calculations performed in the second region. Afterwards, a corrected layout pattern is outputted through the computer system onto a mask.2014-02-06
20140040838Methods For Making A Mask For An Integrated Circuit Design - A method for making a mask for an integrated circuit (IC) design includes receiving an IC design layout having a plurality IC features and performing a targeted-feature-surrounding (TFS) checking operation to identify a targeted-feature-surrounding-location (TFSL) in the IC design layout. The method also includes inserting a phase-bar (PB) to the TFSL, performing an optical proximity correction (OPC) to the IC design layout having the PB to form a modified IC design layout and providing the modified IC design layout for fabrication of the mask.2014-02-06
20140040839METHOD AND SYSTEM FOR DERIVED LAYER CHECKING FOR SEMICONDUCTOR DEVICE DESIGN - A system and method are provided for enabling a systematic detection of issues arising during the course of mask generation for a semiconductor device. IC mask layer descriptions are analyzed and information is generated that identifies devices formed by active layers in the masks, along with a description of all layers in proximity to the found devices. The IC mask information is compared to a netlist file generated from the initial as-designed schematic. Determinations can then made, for example, as to whether all intended devices are present, any conflicting layers are in proximity to or interacting with the intended devices, and any unintended devices are present in the mask layers. Steps can then be taken to resolve the issues presented by the problematic devices.2014-02-06
20140040840CONFLICT DETECTION WITH FUNCTION MODELS - Systems and methods for detecting design conflicts of a product or process are disclosed. A method for detecting design conflicts includes processing a function model of a product or process to identify a plurality of descriptions of functions to be performed by the product or process. The method includes detecting in the plurality of descriptions a first description and a second description in which the first description includes a first design component name that matches a second design component name of the second description, a first descriptive noun that matches a second descriptive noun of the second description, and a first active verb that does not match a second active verb of the second description. The method further includes flagging a relationship between the first description and the second description as a first conflict type and displaying, on a display device, information regarding the first conflict type.2014-02-06
20140040841APPARATUS AND METHOD THEREOF FOR HYBRID TIMING EXCEPTION VERIFICATION OF AN INTEGRATED CIRCUIT DESIGN - Timing Constraints are crucial to meet timing requirements of an Integrated Circuit (IC). Timing exceptions are specified so that certain paths of the design of the IC are not timed as they are not relevant for the speed of the IC. If a path is specified as an exception but it is indeed a timing-relevant path then the design may functionally fail due to timing violations ignored by the timing analysis tools. It is therefore extremely important to ensure that all timing exceptions are correctly specified. The Hybrid Timing Exceptions Verification uses static verification as well as dynamic verification to effectively verify correctness of such timing exceptions. The solution pin-points the errors in the exceptions specification with very low number of false errors that would require significant designer inputs and time to manually waive them.2014-02-06
20140040842TOTAL POWER OPTIMIZATION FOR A LOGIC INTEGRATED CIRCUIT - A method of reducing total power dissipation for logic cells using Boolean equations includes selecting a path, identifying at least one group of logic cells for analysis in the path, and deriving Boolean equations for the at least one group of logic cells. Additionally, the method includes listing possible logic cell implementations for each Boolean equation while maintaining original transistor values, verifying path timing for the possible logic cell implementations to provide retained logic cells that achieve a path timing requirement, computing a total power dissipation for the retained logic cells, and choosing a logic cell set from the retained logic cells corresponding to a minimum total power dissipation for the path. A method for reducing total power dissipation for logic cell sets and a processor configured to reduce total power dissipation for groups of logic cells are also provided.2014-02-06
20140040843LOW-VOLTAGE SWING CIRCUIT MODIFICATIONS - Electronic design automation (EDA) technologies are disclosed that analyze a circuit design for candidate low-voltage swing (LVS) modifications, report the impact of the candidate LVS modifications on circuit characteristics (such as area, timing and energy) and implement selected LVS modifications based on their impact on the circuit characteristics. Candidate LVS modifications comprise replacing existing standard low-voltage swing drivers and receivers, or inserting low-voltage swing drivers and receivers.2014-02-06
20140040844Method for Achieving An Efficient Statistical Optimization of Integrated Circuits - Method for performing timing closure of integrated circuits in the presence of manufacturing and environmental variations. The starting design is analyzed using statistical static timing analysis to determine timing violations. Each timing violation in its statistical canonical form is examined. In a first aspect of the invention, the canonical failing slack is inspected to determine what type of move is most likely to fix the timing violation taking into account all relevant manufacturing and environmental variations. In a second aspect of the invention, pre-characterized moves such as insertion of delay pad cells are evaluated for their ability to fix the timing violation without triggering timing, and the best move or set of moves is selected.2014-02-06
20140040845SYSTEM AND METHOD FOR EMPLOYING SIDE TRANSITION TIMES FROM SIGNOFF-QUALITY TIMING ANALYSIS INFORMATION TO REDUCE LEAKAGE POWER IN AN ELECTRONIC CIRCUIT AND AN ELECTRONIC DESIGN AUTOMATION TOOL INCORPORATING THE SAME - The disclosure provides leakage power recovery that considers side transition times of multi-input cells. In one embodiment, a leakage power recovery system is disclosed that includes: (1) a power recovery module that considers side transitions when making a first conditional replacement of a cell in a path of a circuit design with a lower leakage cell and estimates delays and slack of the at least one path of the circuit design, and (2) a speed recovery module that makes a second conditional replacement of a slower lower leakage cell of the path with a higher leakage cell when there is a timing violation with respect to the path, determines if any other cells of the at least one path has a slower input transition and makes a third conditional replacement of a driver thereof to a higher leakage cell when the driver is one of the slower lower leakage cells.2014-02-06
20140040846CROSSTALK ANALYSIS METHOD - An embodiment of the disclosure provides a crosstalk analysis method executed by a computer. The method includes steps of: executing a layout program; executing a crosstalk analysis program; acquiring, by the crosstalk analysis program, a plurality of parameters from a layout result generated by the layout program; estimating a crosstalk value according to the parameters; determining whether the crosstalk value is larger than a predetermined value; generating a layout suggestion when the crosstalk value is larger than the predetermined value.2014-02-06
20140040847SYSTEM AND METHOD FOR GENERATING PHYSICAL DETERMINISTIC BOUNDARY INTERCONNECT FEATURES FOR DUAL PATTERNING TECHNOLOGIES - One aspect provides a system for generating a layout for dual patterning technologies. In one embodiment, the system includes: (1) a deterministic boundary interconnect feature generator configured to generate a deterministic boundary interconnect feature for a cell based on at least one dual patterning design rule; and (2) cell placement and interconnect routing tools associated with the deterministic boundary interconnect feature generator and configured to place the deterministic boundary interconnect feature.2014-02-06
20140040848Controllable Turn-Around Time For Post Tape-Out Flow - A typical post-out flow data path at the IC Fabrication has following major components of software based processing—Boolean operations before the application of resolution enhancement techniques (RET) and optical proximity correctin (OPC), the RET and OPC step [etch retargeting, sub-resolution assist feature insertion (SRAF) and OPC], post-OPCRET Boolean operations and sometimes in the same flow simulation based verification. There are two objectives that an IC Fabrication tapeout flow manager wants to achieve with the flow—predictable completion time and fastest turn-around time (TAT). At times they may be competing. An alternative method of providing target turnaround time and managing the priority of jobs while not doing any upfront resource modeling and resource planning is disclosed. The methodology systematically either meets the turnaround time need and potentially lets the user know if it will not as soon as possible.2014-02-06
20140040849QUANTUM GATE OPTIMIZATIONS - Disclosed are systems and methods for improving quantum computation simulation execution time by “growing” sets of small quantum gates into larger ones. Two approaches are described. In the first approach, sub-strings may be replaced by a single representative that may be used multiple times throughout the quantum circuit. In the second approach, nearby gates may be coalesced in an iterative fashion, to thereby build larger and larger gates. Results may be cached for re-use. Both of these approaches have proven effective and have gained typical simulation speed-ups of 1-2 orders of magnitude.2014-02-06
20140040850Manufacturability - Techniques are disclosed for modifying an existing microdevice design to improve its manufacturability. With these techniques, a designer receives manufacturing criteria associated with data in a design. The associated design data then is identified and provided to the microdevice designer, who may choose to modify the design based upon the manufacturing criteria. In this manner, the designer can directly incorporate manufacturing criteria from the foundry in the original design of the microdevice.2014-02-06
20140040851OPTIMIZING A CIRCUIT DESIGN FOR DELAY USING LOAD-AND-SLEW-INDEPENDENT NUMERICAL DELAY MODELS - Systems and techniques are described for optimizing a circuit design. Specifically, gate sizes in the circuit design are optimized by iteratively performing a set of operations that include, but are not limited to: selecting a portion of the circuit design (e.g., according to a reverse-levelized processing order), selecting an input-to-output arc of a driver gate in the portion of the circuit design, selecting gates in the portion of the circuit design for optimization, modeling a gate optimization problem based on the selected input-to-output arc of the driver gate and the selected gates, solving the gate optimization problem to obtain a solution using one or more solvers, and discretizing the solution. Discretizing the solution involves identifying library cells that exactly or closely match the gate sizes specified in the solution. These library cells can then be used to model other gate optimization problems in the current or subsequent iterations.2014-02-06
20140040852SYSTEMS AND METHODS FOR CHARACTERIZING DEVICES - A device characterization system includes a characterization tool and a test flow development generator. The characterization tool is configured to perform testing on a product device according to a test flow and generate test data. The characterization tool includes a list of available test instances that can be performed. The test flow development generator is configured to automatically generate the test flow according to device specifications for the product device and selected test instances of the list of available test instances.2014-02-06
20140040853Semiconductor Device with Damage Detection Circuit and Method for Producing the Same - A semiconductor chip having a current source coupled between a first potential and an electrical node, a detection circuit having an input coupled to the electrical node, and a first active component coupled in series with the current source and further coupled between the electrical node and a second potential, wherein the first active component is coupled to the electrical node via a first conductive interconnect.2014-02-06
20140040854METHOD AND APPARATUS FOR PROVIDING TEMPLATE-BASED APPLICATIONS - An approach is provided for template or component-based applications. A service platform determines one or more application components preloaded on at least one device. The service platform causes, at least in part, a generation of code for at least one application. The code is at least one graph of one or more references to the application components. The service platform then causes, at least in part, a transmission of the code to the at least one device, wherein the code is processed by the at least one device to construct the application from the application components.2014-02-06
20140040855Optimization of a Data Flow Program Based on Access Pattern Information - System and method for optimizing a data flow diagram based on access pattern information are described. Access pattern information for a data flow diagram may be received. The data flow diagram may include a plurality of interconnected actors, e.g., functional blocks, visually indicating functionality of the data flow diagram. The access pattern information may include one or more of: input pattern information specifying cycles on which tokens are consumed by at least one of the actors, or output pattern information specifying cycles on which tokens are produced by at least one of the actors. A program that implements the functionality of the data flow diagram may be generated based at least in part on the access pattern information.2014-02-06
20140040856Apparatus, Method and System for Building Software by Composition - A method and system are disclosed for building complex real-time software that scales well to a large number of processors or CPU cores. The software design and implementation method are based on a combination of object composition (hierarchical assembly) and desynchronizable inter-object interactions.2014-02-06
20140040857INSTRUMENTATION OF SOFTWARE APPLICATIONS FOR CONFIGURATION THEREOF - A solution is proposed for instrumenting a software application for configuration thereof. A corresponding method includes scanning a source code of the software application for detecting an indication of a set of configuration parameters each one being identified by a pre-defined non-executable statement, creating a set of instances of a pre-defined configuration object each one mapping a corresponding one of the configuration parameters, the configuration object being designed to manage the corresponding configuration parameter, and creating a set of configuration interfaces for editing the configuration parameters, the configuration interfaces being operable to interact with each instance of the configuration object to get and set the corresponding configuration parameter.2014-02-06
20140040858METHOD AND APPARATUS FOR GENERATING RESOURCE EFFICIENT COMPUTER PROGRAM CODE - A method for generating resource efficient computer program code is described. The method comprises receiving at an input of an apparatus for creating program code of a representation of source code for computer program code to be generated, analysing by the apparatus by the apparatus the received representation of source code to determine sections within the source code for which potential optimizations are available; and upon determining at least one section within the source code for which at least one potential optimization is available, identifying by the apparatus the at least one potential optimization for the at least one determined section within the source code, and implementing by the apparatus the at least one potential optimization within the source code.2014-02-06
20140040859Generating and Presenting Property Editors - Various aspects can be implemented to generate property editors for configuring visual objects, such as user interfaces and complex graphical objects, and present the property editors with visual indicators linking to the visual object. In general, one aspect of the subject matter described in this specification can be embodied in a method that includes receiving user input to access a property editor associated with at least one feature of a visual object. The method also includes dynamically generating the property editor in response to the user input. The method further includes presenting the visual object and the property editor on a display screen along with a visual indicator linking at least one aspect of the property editor to the at least one feature of the visual object. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.2014-02-06
20140040860Efficient and Expansive Conversions Between Reference and Primitive - A tool, such as a compiler or an interpreter, receives program source code and determines that the code includes an operation for which type conversion is permitted on an operand. The tool determines a source type of the operand, and a target type to which the operand is to be converted. In response to determining that the source type is a reference type and the target type is a primitive type, the tool generates a set of instructions to (a) determine whether, at run time, in accordance with a class definition of the reference type, a value of the target primitive type can be obtained via one or more method invocations on the operand (b) if such a value can be obtained, obtain the value and assign the value to a result of the operation and (c) if such a value cannot be obtained, generate an error indication.2014-02-06
20140040861METADATA DRIVEN SOFTWARE ARCHITECTURE - Embodiments of the present invention provide a metadata-driven software architecture that enables multi-tenant application development. Specifically, an application development architecture is provided including a data table that stores the application-accessible data that maps to all custom objects and their fields, as defined by metadata in objects and fields. Forms, reports, work flows, user access privileges, tenant-specific customizations and business logic, and definitions of underlying data tables and indexes exist as metadata. Application components are generated at runtime using the metadata.2014-02-06
20140040862Copying Reusable Components from a Remote Source - Methods, systems, and apparatus, including computer program products, for reusing a component. In one aspect, a method includes detecting insertion into a target application of a reusable component associated with a remote source; identifying a library corresponding to the reusable component, wherein the library is maintained at the remote source; loading the library into a storage location accessible to the target application to create a local library; and instantiating the reusable component in the target application in accordance with the local library. Further, limited system privileges can be granted to the reusable component. Additionally, the reusable component can be assigned to a sandbox based on one or more granted system privileges.2014-02-06
20140040863DOCUMENTATION GENERATION FOR WEB APIS BASED ON BYTE CODE ANALYSIS - Documentation for an application or web service, such as a web application programming interface (API), is generated by analyzing bytecode for the application itself. Metadata contained within the bytecode and that specifies the functionality of the web service is extracted and used as a template and basis for documentation. A second source of documentation, which contains detailed documentation of the web service, is contributed by the web service developer and merged with the metadata extracted from the bytecode.2014-02-06
20140040864SYSTEM AND METHOD FOR USING A SHARED STANDARD EXPECTATION COMPUTATION LIBRARY TO IMPLEMENT COMPLIANCE TESTS WITH ANNOTATION BASED STANDARD - A system and method can implement compliance tests with annotation based standards using a model library. The model library encapsulates expectation computation logic described in one or more annotation based assertions. A compliance test can obtain an actual value for one or more software properties based on evaluating a source file that contains one or more annotations that is defined by the one or more annotation based assertions, and can determine an expected value for the one or more software properties using the model library. Then, the compliance test can compare the actual value for the one or more software properties with the expected value for the one or more software properties.2014-02-06
20140040865SYSTEM AND METHOD FOR USING AN ABSTRACT SYNTAX TREE TO ENCAPSULATE THE DESCRIPTIVE ASSERTIONS IN AN ANNOTATION BASED STANDARD INTO A CODE BASED LIBRARY - A system and method can support compliance tests with annotation based standards using an expectation library. The expectation library can convert one or more descriptive assertions into a structured data model, wherein the one or more descriptive assertions describe one or more annotations. Furthermore, the expectation library can parse a source file that contains the one or more annotations based on the structured data model. Additionally, the expectation library can obtain information related to the one or more annotations of the source file from the structured data model.2014-02-06
20140040866MANAGING CODE INSTRUMENTATION IN A PRODUCTION COMPUTER PROGRAM - A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code.2014-02-06
20140040867SYSTEM TEST SCOPE AND PLAN OPTIMIZATION - Various embodiments include at least one or systems, methods, and software providing abilities to automatically generate a test plan that mitigates risk involved in testing less than an entirety of a software system following modification. Some embodiments operate to allow a user to influence the scope of an optimized test plan while also reducing a number of tests and test execution effort involved. Such embodiments may identify portions of the software system to test and portions of the software system that will not be tested in a manner that reduces a total testing effort involved. Reductions in testing effort are performed in generation of the test plan in view of testing preferences which are utilized not only to reduce the total effort in executing a test plan, but also does so to optimize the test plan.2014-02-06
20140040868AUTOMATIC REPAIR OF SCRIPTS - A method and associated system for repairing a script. A missed object is detected among one or more objects of the running script, the missed object being unrecognized from an original object of a previous running of the script. A change type of the detected missed object is determined. The script is repaired based on the change type.2014-02-06
20140040869Call Graph Simplification/Comparison and Automatic Initial Suspects Finding of Performance Degradations - In one embodiment, a method for call graph analysis is provided. The method includes determining a plurality of nodes in a call graph. The plurality of nodes represent resource consumption of functions of a software program executed in a software system. A simplification factor is determined. A first set of nodes in the plurality of nodes is then eliminated based on exclusive values for the plurality of nodes, inclusive values for the plurality of nodes, and the simplification factor. An inclusive value for a node is a first amount of resources consumed by the node and any descendent nodes of that node. An exclusive value for the node is a second amount of resources consumed by the node. A simplified call graph is output including a second set of nodes in the plurality of nodes. The second set of nodes does not include the eliminated first set of nodes.2014-02-06
20140040870Installing One or More Programs, and at Least a Portion of Their Environment - A system and method installs a computer program, as well as the environment in which the computer program operates, if such environment is not already installed. The program as well as its environment are obtained via one or more servers and a computer network.2014-02-06
20140040871MOBILE BUILD, QUALITY AND DEPLOYMENT MANAGER - The present technology relates to computer implemented methods and systems for managing mobile applications by executing various routines on one or more computers in connection with the mobile applications. The present technology can involve routines and tools that download source code from a code repository. The present technology automatically builds the source code to create an executable build. The present technology can perform a check on the executable build according to a defined quality control rule, and communicate the executable build to an application repository. In certain aspects, the present technology can monitor application metrics and generate reports relating to the application metrics. In certain embodiments, the present technology compiles a launchability metric that establishes the mobile application's readiness for launch.2014-02-06
20140040872SYSTEMS AND METHODS FOR TESTING A COMPILER THROUGH COMPILE-TIME DECISION FEEDBACK - Systems and methods for automatic generation of one or more test programs to be used in conjunction with a test framework for testing a compiler are disclosed. A compiler is instrumented to generated data exposing various internal decisions and/or actions made by the compiler. A test program is generated by test framework and compiled by the compiler and the output is validated by the test framework to ensure that the compiler is behaving according to its compiler specification.2014-02-06
20140040873Updating Applications Using Migration Signatures - In general, in one aspect, an installation file digitally signed with a first package signature is received. It is determined whether the received installation file includes a migration signature that covers the first package signature and that matches a second signature associated with an installed software application, to confirm that the received installation file includes a valid update related to the installed software application. The installed software application is updated from the received installation file when the migration signature is included.2014-02-06
20140040874IMPLEMENTING MULTIPLE VERSIONS OF A PLUG-IN CONCURRENTLY - A system and method for implementing multiple versions of a plug-in concurrently are provided herein. The method includes identifying a plug-in within a multi-plug-in platform that is configured to provide a desired functionality. The method also includes executing a first version and a second version of the plug-in concurrently to provide the desired functionality, wherein each version of the plug-in is isolated from the other version of the plug-in.2014-02-06
20140040875FEDERATED SYSTEM AUTOMATIC UPDATE COMMUNICATION TO ENABLE SELECTIVE UPDATE OF CRITICAL FIRMWARE ELEMENTS - A method for firmware update coordination in a federated computing system can include receiving in a host one of different computers coupled to one another in a federated computing system, different version levels of firmware versions in peer ones of the different computers. The method additionally can include recording in a compatibility list in the host computer, different version levels of firmware versions for respectively different peer ones of the computers. The method yet further can include selecting a firmware update to be applied to the host computer and comparing a version level of the selected firmware update to the different version levels in the compatibility list. Finally, the firmware update can be applied to the host computer only if the version level of the selected firmware update is present in the compatibility list, but otherwise rejecting the firmware update.2014-02-06
20140040876Software Activation Systems - We describe a method of activating functionality of an item of software installed on a mobile device, the method comprising: installing said software on said mobile device, wherein said installing includes registering in an operating system of said mobile device a link between an application URI scheme and said software such that a URI having said application URI scheme will be passed to said installed software for processing; scanning a code into said mobile device, wherein said code includes a code URI comprising said application URI scheme and activation data for said item of software; interpreting said application scheme of said code URI using said registered link to pass said code URI to said installed software; and processing said code URI using said installed software to activate a function of said item of software using said activation data in said code URI.2014-02-06
20140040877APPLICATION EXECUTION AND INSTALLATION ENVIRONMENT - Methods, systems, and apparatus, including medium-encoded computer program products, for installing software, including application execution environments, on a computer platform. One or more aspects of the subject matter described in this specification can be embodied in one or more methods that include obtaining an installer package for a target computer, the installer package including an application execution environment program and an installer for a software program, the application execution environment program including a cross-platform application program interface to provide services to applications that run in the application execution environment, wherein the installer runs in the application execution environment; and providing the installer package to the target computer to install the software program by running the installer in the application execution environment copied to the target computer.2014-02-06
20140040878INSTALLING AN APPLICATION INTO A VIRTUALIZED ENVIRONMENT - An electronic device has a plurality of virtualized environments. Selection of an application of an application store is received, and a virtualized environment is identified for installing the application selected from the application store.2014-02-06
20140040879INTERMEDIATE APPLICATION INSTALLATION FILE - Methods, systems, and apparatus, including medium-encoded computer program products, for effecting software installation. In one aspect, a method includes specifying a first file type for application installation files for an application execution environment, and specifying a second file type for application distribution files corresponding to the application installation files, wherein an application installation file of the first file type includes a software application, the application installation file must be digitally signed for the software application to be installed in the application execution environment from the application installation file, and wherein an application distribution file of the second file type includes the software application, the software application is not installable in the application execution environment from the application distribution file, and the application distribution file is convertible to the first file type through at least addition of a digital signature.2014-02-06
20140040880APPLICATION DEPLOYMENT IN HETEROGENEOUS ENVIRONMENTS - Techniques are disclosed for evaluating an application to determine a processing environment suited for executing the application. A request may be received to execute the application. If execution data identified for the application do not satisfy a first set of criteria, the application is deployed for execution on a first processing environment. If the execution data satisfy the first set of criteria, the application is deployed for execution partially in time on a second processing environment, based on the execution data. The second processing environment provides a higher capability than the first processing environment in terms of at least one resource type.2014-02-06
20140040881MODEM INSTALLATION - A device is disclosed herein. In one embodiment; the device includes: a wireless transceiver; an interface for connecting with a terminal running one of the first and second operating systems; memory storing the driver software for installation on the terminal if running the second operating system; and processing apparatus operable to output a first definition of a configuration of the device and a second definition of a configuration of the device; wherein the first definition defines configuration of the device as a storage device for providing the driver software to the terminal; and on condition that the terminal is running the first version of the first operating system, the second definition defines configuration of the device as a modem.2014-02-06
20140040882TECHNIQUES FOR RAPID DEPLOYMENT OF SERVICE ARTIFACTS - A framework (referred to herein as Application Integration Architecture, or AIA) that formalizes and orchestrates activities in an SOA development lifecycle. In one set of embodiments, AIA can capture development-related information in a shared data store and cause the information to flow in an automated or semi-automated manner from one lifecycle phase to the next as the lifecycle progresses. This information flow can, in turn, facilitate automations at each lifecycle phase for the responsible stakeholders (e.g., solution architects, developers, installation developers, etc.), thereby enforcing SOA best practices, enhancing development productivity, and ensuring the quality of the final SOA deliverables.2014-02-06
20140040883METHOD AND SYSTEM TO DETERMINE A WORK DISTRIBUTION MODEL FOR AN APPLICATION DEPLOYED ON A CLOUD - A system is described to determine a work distribution model for a computing application deployed on a cloud. In one embodiment, the system comprises a launch request detector, a provisioning module, and a work distribution module. The launch request detector may be configured to detect a request from a client device to launch a computing application. The provisioning module may be configured to provision an application container on a virtual instance of a machine for executing the computing application. The work distribution module may be configured to generate a work distribution model for the computing application, the work distribution model indicating a first portion of the computing application to be executed on the client device and a second portion of the computing application to be executed on the virtual instance of a machine. The client device may be a desktop device or a client device.2014-02-06
20140040884CLOUD BURSTING - A system is provided to reroute a request received within one virtualization service for processing within another virtualization service. The system comprises an offload manager, and a response service module. The offload manager may be configured to determine that an overflow request from a client computer system is suitable for being processed at a computer system provided within a second virtualization service and, in response, reroute the overflow request to a computer system provided within a second virtualization service. The response service module may be configured to receive a result of processing of the overflow request from the computer system provided within the second virtualization service and prepare the received result for communicating to the client computer system.2014-02-06
20140040885AUTONOMOUS APPLICATION-LEVEL AUTO-SCALING IN A CLOUD - A method and system for application-level auto-scaling in a cloud computing environment is provided. An example system includes a data collector and a scaling module. The data collector is to collect application-level data that reflects demand for a subject computing application executing on the virtual instance of a machine provided by a virtualization service. The scaling module is to select a scaling action based on the application-level data and issue a request to perform the scaling action with respect to the virtual instance of a machine.2014-02-06
20140040886SECURE OPERATIONS FOR VIRTUAL MACHINES - In one implementation, a secure operation system initiates a secure operation associated with a virtual machine hosted at a secured host, and determines when the secure operation is complete. In response to determining that the secure operation is complete, the secure operation system migrates the virtual machine to a host other than the secured host.2014-02-06
20140040887CUSTOMIZED VIRTUAL MACHINE CREATION - A method of creating a customized virtual machine comprises, with a processor, booting a virtual machine into a service operating system, with a customization agent, customizing a main operating system while the virtual machine is in maintenance mode, and rebooting the virtual machine into the main operating system of the virtual machine. A computer program product for creating a customized virtual machine comprises a computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code comprising computer usable program code to, when executed by a processor, boot a virtual machine into a service operating system, and computer usable program code to, when executed by a processor, customize a main virtual operating system while the virtual machine is in maintenance mode.2014-02-06
20140040888VIRTUAL MACHINE MIGRATION INTO THE CLOUD - The migration of virtual machines internal to a cloud computing environment. The cloud maintains the replicas for virtual machines that could be migrated. The cloud also is aware of location of user data for each of the virtual machines. The replica together with the user data, represents the virtual machine state. If migration to the cloud computing environment is to occur for any given virtual machine, the cloud computing environment correlates the replica with the user data for that virtual machine, and then uses the correlation to instantiate the virtual machine in the cloud.2014-02-06
20140040889Facilitating Customer-Initiated Virtual Machine Migration and Swapping - Techniques for facilitating customer-initiated virtual machine (VM) migration and swapping. A method includes obtaining documentation of at least one performance parameter of two or more virtual machines running on two or more physical machines, obtaining a request for a virtual machine exchange from a user of a first virtual machine, wherein the request comprises a preference for at least one desired performance parameter in at least one additional virtual machine, matching the request from the user of the first virtual machine with at least one additional virtual machine that includes the at least one desired performance parameter without assistance from a cloud provider, and exchanging the first virtual machine with a virtual machine from the at least one additional virtual machine that includes the at least one desired performance parameter.2014-02-06
20140040890TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINE CLONING - Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.2014-02-06
20140040891SELECTING PROVISIONING TARGETS FOR NEW VIRTUAL MACHINE INSTANCES - One embodiment of a method for provisioning a new virtual machine instance based on the content of an image of the new virtual machine instance includes identifying, from among a plurality of host machines, the host machine having the highest percentage of the content available in local storage, and provisioning the new virtual machine instance on the host machine having the highest percentage of the content available in local storage. Another embodiment of a method for provisioning a new virtual machine instance based on an image of the new virtual machine instance includes constructing at least a portion of the image using data stored locally on a target machine hosting the new virtual machine instance, and completing the image using data obtained over a network from remote storage.2014-02-06
20140040892Facilitating Customer-Initiated Virtual Machine Migration and Swapping - A system and an article of manufacture for facilitating customer-initiated virtual machine (VM) migration and swapping include obtaining documentation of at least one performance parameter of two or more virtual machines running on two or more physical machines, obtaining a request for a virtual machine exchange from a user of a first virtual machine, wherein the request comprises a preference for at least one desired performance parameter in at least one additional virtual machine, matching the request from the user of the first virtual machine with at least one additional virtual machine that includes the at to least one desired performance parameter without assistance from a cloud provider, and exchanging the first virtual machine with a virtual machine from the at least one additional virtual machine that includes the at least one desired performance parameter.2014-02-06
20140040893SELECTING PROVISIONING TARGETS FOR NEW VIRTUAL MACHINE INSTANCES - One embodiment of a system for provisioning a new virtual machine instance on a target host based on an image of the new virtual machine instance includes a local storage for storing images of virtual machine instances currently running on the target host and a virtual machine creator coupled to the local storage for constructing the image of the new virtual machine instance at least in part using the images of virtual machine instances currently running on the target host.2014-02-06
20140040894METHOD AND SYSTEM FOR PSEUDO-VIRTUALIZATION OF APPLICATION RUNNING ENVIRONMENT ON A HOST SERVER - A method and system for running multiple instances of a computer application into a virtual environment on a host server, and more specifically for running multiple instances of an operating system such as a mobile devices operating system, on the internet cloud. The method includes launching a global service manager, and having this service manager querying a binder driver which handles interprocess communications, so that the global service manager becomes a binder context manager for managing the running of multiple instances of the computer application into a virtual running environment. The method also includes launching, when launching any instance of the application after launch of the global service manager, a local service manager for handling service management for the instance of the application into a pseudo-virtual environment, the local service manager being registered by the binder context manager as local service manager for the instance of the application.2014-02-06
20140040895ELECTRONIC DEVICE AND METHOD FOR ALLOCATING RESOURCES FOR VIRTUAL MACHINES - In a method for allocating resources for a virtual machine (VM), usage rates of specified resources of the VM are obtained. A resource level of the VM is determined according to an average usage rate of each specified resource, to obtain a proposal for a revised resource allocation corresponding to the resource-utilization level of the VM.2014-02-06
20140040896HIGH AVAILABILITY VIRTUAL MACHINE CLUSTER - One embodiment of the present invention is a system including: (a) plural virtualization systems configured in a cluster; (b) storage accessible to each virtualization system of the cluster, wherein for each virtual machine operative in a virtualization system of the cluster, the storage maintains a representation of virtual machine state that includes at least a description of a hardware system virtualized and an image of virtualized memory state for the virtual machine; and (c) a failover system that, responsive to an interruption of, or on, a particular one of the virtualization systems, transitions at least one affected virtual machine to another virtualization system of the cluster and resumes computations of the transitioned virtual machine based on state encoded by a corresponding one of the virtual machine states represented in the storage.2014-02-06
20140040897Function Evaluation using Lightweight Process Snapshots - A debugger creates a lightweight process snapshot of a debuggee target process and performs in-process or function evaluation (func-eval) inspection against the copy. This allows most state in the debuggee process to stay intact because changes made by the func-eval are local to the process snapshot. Debugger operations that are too destructive to the original debuggee process can be performed on the process snapshot without threatening the real process. Process snapshots allow the debugger to perform a func-eval while isolating the debuggee process and not losing the actual state of the original debuggee process. A new process snapshot of the debuggee process is created when the current snapshot is corrupt due to a func-eval side effect. The debugger may also use a lightweight machine snapshot of the host debuggee machine and perform func-evals against that machine snapshot to further isolate kernel and other side effects.2014-02-06
20140040898DISTRIBUTED TRANSACTION PROCESSING - A system includes an initiator and processing nodes. The initiator distributes portions of a transaction among the processing nodes. Each processing node has at least one downstream neighbor to which the processing node sends commit messages. The commit messages include a commit status of the processing node. The downstream neighbor is also a processing node.2014-02-06
20140040899SYSTEMS AND METHODS FOR DISTRIBUTING A WORKLOAD IN A DATA CENTER - A data center workload distribution management system includes a cooling cost engine to determine a cooling cost or cooling capacity for each of a plurality of zones of a data center and a workload distribution engine. The workload distribution engine is to identify the zone that has a lowest cooling cost and sufficient cooling capacity and also has sufficient processing capacity for a workload, determine a local cooling efficiency index for at least one location within the identified zone, and distribute the workload to the location having a local cooling efficiency index that indicates the highest cooling efficiency.2014-02-06
20140040900STORAGE MANAGING DEVICE AND METHOD AND ELECTRONIC APPARATUS - A storage managing device and method and an electronic apparatus are provided. The storage managing device is applied to a storage device composed of a plurality of storage blocks, comprising: a thread collecting unit configured to collect threads to be executed in a predetermined time; a thread dividing unit configured to divide the collected threads into n thread groups based on a predetermined strategy; a thread holding unit configured to designate one or more storage blocks to each thread group to store the data necessary for the execution of each thread group into the one or more storage blocks; a thread executing unit configured to execute the threads; and a power consumption setting unit configured to set the one or more storage blocks designated to the threads being executed to an active status, while set other storage blocks to a low power consumption status. With the storage managing device and method and the electronic apparatus according to the embodiments of this invention, the consumption and temperature of the storage device can be lowered significantly while maintaining the capability of the storage device.2014-02-06
20140040901INTER-THREAD DATA COMMUNICATIONS IN A COMPUTER PROCESSOR - A first set of one or more hardware threads for receiving messages sent from hardware threads are registered. After receiving indications of a message location value and a number, the message location value is increments and sent to a different hardware thread of the first set of one or more hardware threads until the message location value has been incremented the number of times or a criterion for interrupting the incrementing and sending is satisfied. An actual number of times the message location value was incremented is indicated to a hardware thread that sent the indications of the message location value and the number.2014-02-06
20140040902Process Instance Serialization - Method and system for serializing access to datasets, suitable for use in a workflow management system which executes multiple business processes, wherein a single process instance is enabled to invoke web services which may update datasets of different storages holding redundant information. Business Process Execution Language for Web Services allows defining business processes that make use of web services and business processes that externalize their functionality as web services. As the business process has no knowledge about data that is accessed by invoked web services, concurrent process instances may update the same pieces of information within a database. Unless access to the data is carried out as a transaction, parallel execution of the process instances may cause data inconsistencies, which may be avoided by serializing the execution of process instances based on correlation information associated with messages consumed by the process instances.2014-02-06
20140040903Queue and operator instance threads to losslessly process online input streams events - A queue enqueues an online input stream of events arriving at the queue in real-time. An operator instance has one or more threads to losslessly dequeue and process the events from the queue, and to output processing results of the events in a common output stream. The one or more threads are dynamically instantiated and destantiated to maintain an optimal number of the one or more threads while ensuring that none of the events of the online input stream are dropped.2014-02-06
20140040904METHOD AND APPARATUS FOR IMPROVING PROCESSING PERFORMANCE OF A MULTI-CORE PROCESSOR - A method for managing task execution in a multi-core processor includes employing a spinlock to effect a dynamically enforceable mutual exclusion constraint and employing a multi-processor priority ceiling protocol to effect the dynamically enforceable mutual exclusion constraint to synchronize a plurality of tasks executing in the first and second processing cores of the multi-core processor.2014-02-06
20140040905TASK EXECUTION CONTROLLER, TASK EXECUTION CONTROL SYSTEM, AND TASK EXECUTION CONTROL METHOD - A task execution controller includes a context generating unit that generates context information concerning a user and a surrounding situation of the user; a task managing unit that stores multiple tasks the user attempts to execute, selects a task according to the context information and a predetermined task selection rule, and controls execution of the task; and a service managing unit that confirms services executed by a device used for execution of the task, gives notification of a service corresponding to the execution of the task selected by the task managing unit, to the device and causes the device to perform the service. The task managing unit selects a task by using, as the task selection rule, information of priority levels of tasks and an execution-related dependency relation between tasks preset among the tasks.2014-02-06
20140040906OPTIMIZING PREEMPTIVE OPERATING SYSTEM WITH MOTION SENSING - A method and apparatus to provide a scheduler comprising determining a current use characteristic for the mobile device based on motion information and active applications, and scheduling a task based on the current use characteristics.2014-02-06
20140040907RESOURCE ASSIGNMENT IN A HYBRID SYSTEM - A system processing an application in a hybrid system includes a database comprising a plurality of libraries, each library comprising sub-program components, wherein two or more of the components are combined by an end user into a stream flow defining an application. The system also includes a plurality of resources configured to process the stream flow, architecture of at least one of the plurality of resources being different from architecture of another of the plurality of resources. The system also includes a compiler configured to generate a resource assignment assigning the plurality of resources to the two or more of the components in the stream flow, at least two of the two or more of the components in the stream flow sharing at least one of the plurality of resources according to the resource assignment.2014-02-06
20140040908RESOURCE ASSIGNMENT IN A HYBRID SYSTEM - A system processing an application in a hybrid system includes a database comprising a plurality of libraries, each library comprising sub-program components, wherein two or more of the components are combined by an end user into a stream flow defining an application. The system also includes a plurality of resources configured to process the stream flow, architecture of at least one of the plurality of resources being different from architecture of another of the plurality of resources. The system also includes a compiler configured to generate a resource assignment assigning the plurality of resources to the two or more of the components in the stream flow, at least two of the two or more of the components in the stream flow sharing at least one of the plurality of resources according to the resource assignment.2014-02-06
Website © 2025 Advameg, Inc.