44th week of 2008 patent applcation highlights part 73 |
Patent application number | Title | Published |
20080270947 | Control of interactions within virtual environments - A method for restricting the number of consequential interactions to further virtual objects having a relationship with a first virtual object, resulting from an interaction with said first virtual object. The method comprises: defining a maximum number of consequential interactions, counting consequential interactions, and stopping further interaction when the maximum number of consequential interactions is reached. | 2008-10-30 |
20080270948 | SUITE-WIDE NAVIGATION - Novel tools for navigating among a suite of business applications, including without limitaion menu systems for business application suites. In some cases, the menu is customized for a particular user of the business application suite. Hence, for example, a menu might comprise only items necessary to that user's job function and/or access level, as defined by one or more user roles that the user possesses. In anotner example, menu items may be provided only for actions that the user has appropriate permissions to take and/or pages that the user has appropriate permissions to view. | 2008-10-30 |
20080270949 | Methods and Systems for Navigation and Selection of Items within User Interfaces with a Segmented Cursor - Methods and systems for navigating and selecting items within a user interface. Various groupings of items may be displayed and selected within the user interfaces which may further include a graphical rounded positioning locator. The locator can be designed to resemble a compass with indicia to provide the user with a relative location and bearings within an arrangement of items. The indicia can include rounded lettering having a curvature that may additionally indicate optional rotational or wraparound menu features. Furthermore, user interfaces are provided which may include segmented cursors or pointers with multiple select keys that provide a plurality of items to choose from within the display rather than just one available item or selection. Items can be any kind of alphabetical and/or numerical information such as contact information with names and addresses, or any other kind of data including television programming within a viewing guide or other data displayed within documents or spreadsheets. | 2008-10-30 |
20080270950 | METHOD AND APPARATUS FOR IMPORTING DATA FROM AN APPLICATION INTO A SECOND APPLICATION - One embodiment of the present invention provides a system that automatically acquires data from an application and imports the data into a second application. During operation, the system receives at a data-acquisition tool a command from a user to acquire data from the application. In response to the command, the system overlays a semi-transparent layer over at least a portion of a display which is generated by the application, so that the data within the display is still visible to the user. Next, the system receives a drawing command from the user to draw a shape around an item of data within the display. In response to the drawing command, the system draws a shape around the item of data within the display, wherein the shape is drawn on the semi-transparent layer. The system then acquires the item of data bounded by the shape. | 2008-10-30 |
20080270951 | Embedded Test Circuit For Testing Integrated Circuits At The Die Level - A design structure instantiated in a machine readable medium; the design structure includes all of the necessary information for designing a test circuit. The test circuit is used for performing device-specific testing and acquiring parametric data on integrated circuits, for example ASICs, such that each chip is tested individually without excessive test time requirements, additional silicon, or special test equipment. The design structure includes at least one test circuit and may be integrated into an IC design, along with all of the required manufacturing data for producing a final design structure. The final design structure may be in the form of a GDS storage medium or another form of medium suitable for sending the final data structure to, for example, a manufacturer, foundry, customer, or other design house. | 2008-10-30 |
20080270952 | Dynamic sampling of functional simulation to determine whether to perform both functional and timing simulation - A method for simulating a system normally performs functional simulation of the system without performing timing simulation of the system. The method dynamically samples the functional simulation of the system at intervals to determine whether the functional simulation has entered into a new phase. Where the functional simulation has entered into a new phase, the method performs both the functional simulation and the timing simulation of the system for one or more intervals. | 2008-10-30 |
20080270953 | IC CHIP AT-FUNCTIONAL-SPEED TESTING WITH PROCESS COVERAGE EVALUATION - Methods, systems and program products for evaluating an IC chip are disclosed. In one embodiment, the method includes running a statistical static timing analysis (SSTA) of a full IC chip design; creating at-functional-speed test (AFST) robust paths for an IC chip, the created robust paths representing a non-comprehensive list of AFST robust paths for the IC chip; and re-running the SSTA with the SSTA delay model setup based on the created robust paths. A process coverage is calculated for evaluation from the SSTA runnings; and a particular IC chip is evaluated based on the process coverage. | 2008-10-30 |
20080270954 | System for and Method of Integrating Test Structures into an Integrated Circuit - A system and method for performing device-specific testing and acquiring parametric data on integrated circuits, for example ASICs, such that each chip is tested individually without excessive test time requirements, additional silicon, or special test equipment. The testing system includes a device test structure integrated into unused backfill space in an IC design which tests a set of dummy devices that are identical to a selected set of devices contained in the IC. The device test structures are selected from a library according to customer requirements and design requirements. The selected test structures are further prioritized and assigned to design elements within the design in order of priority. Placement algorithms use design, layout, and manufacturing requirements to place the selected test structures into the final layout of the design to be manufactured. | 2008-10-30 |
20080270955 | METHOD AND APPARATUS FOR MODIFYING EXISTING CIRCUIT DESIGN - The illustrative embodiments provide a computer implemented method and apparatus for modifying an existing circuit design. For a modification in a design of a circuit, the circuit design tool receives a code describing the modification, and a design of the circuit. The design of the circuit includes a first design, which includes a design for a number of metallic layers in the circuit. The design of the circuit further includes a second design, which includes and a design for a number of non-metallic layers in the circuit. The circuit design tool identifies a set of hooks, a set of disconnected components, and a set of filler cells in the design of the circuit. The circuit design tool produces a modification design, which is implemented in a revision of the first design, using the code, and one or more of the hooks, the disconnected components, and the filler cells. | 2008-10-30 |
20080270956 | SEMICONDUCTOR INTEGRATED CIRCUIT DESIGNING METHOD, SEMICONDUCTOR INTEGRATED CIRCUIT DESIGNING APPARATUS, AND RECORDING MEDIUM STORING SEMICONDUCTOR INTEGRATED CIRCUIT DESIGNING SOFTWARE - According to the present invention, there is provided a method for designing a circuit, having, generating electrical filter graphic data indicating a candidate portion where a dimensional value of a layout pattern is permitted to deviate from a design value by taking account of an electrical characteristic, and electrical filter data indicating the permissible dimensional value in the candidate portion of the layout pattern by taking account of the electrical characteristic, by using circuit diagram data, a static timing analytical result, and a result of a circuit simulation, and store them in the storage unit, generating design data by using the electrical filter graphic data, and form a layout pattern by using the design data, detecting a lithography error by performing a lithography simulation on the layout pattern, determining by using the electrical filter database whether the error requires correction by taking account of the electrical characteristic, correcting the layout if the error is found to require the correction, and outputting a result of the correction of the layout. | 2008-10-30 |
20080270957 | SEMICONDUCTOR INTEGRATED CIRCUIT DESIGNING APPARATUS, SEMICONDUCTOR INTEGRATED CIRCUIT DESIGNING METHOD AND SEMICONDUCTOR DEVICE - A semiconductor device includes a plurality of logical elements and a plurality of wiring lines. The plurality of wiring lines have a wiring line which connects the logical elements to each other, and a wiring line which is disconnected on one end from one of the logical elements and connected on the other end to another one of the logical elements. | 2008-10-30 |
20080270958 | METHOD AND SYSTEM FOR DEBUG AND TEST USING REPLICATED LOGIC - A method and system for debug and test using replicated logic is described. A representation of a circuit is compiled. The circuit includes a replicated portion and delay logic to delay inputs into the replicated portion. The circuit may also include trigger logic and clock control logic to enable execution of the replicated portion of the circuit to be paused when a trigger condition occurs. The compiled representation of the circuit may be programmed into a hardware device. A debugger may then be invoked. One or more triggering signals are selected. For each selected triggering signal, one or more states are selected to setup a trigger condition. The hardware device may then be run. The replicated portion of the circuit will be paused when the trigger condition occurs. The states of registers in the replicated portion of the circuit and the sequence of inputs that led to the trigger condition are recorded. This recorded data may then used to generate a test to be run on a software simulator when the circuit is modified. | 2008-10-30 |
20080270959 | Influencing functional simulation of a system by timing simulation of the system - A method performs functional simulation of a system as influenced by timing simulation of the system. The method performs functional simulation of a system, and periodically performs timing simulation of the system. The functional simulation of the system takes into account the timing simulation of the system that is periodically performed. | 2008-10-30 |
20080270960 | METHOD FOR INCORPORATING MILLER CAPACITANCE EFFECTS IN DIGITAL CIRCUITS FOR AN ACCURATE TIMING ANALYSIS - A method for performing a static timing analysis on a circuit that includes gates and their respective interconnects by incorporating the effect of Miller capacitance on timing. A primitive gate is selected with its respective fan-out gates, interconnects attached to the primitive gate's output and interconnects attached to the output of each respective fan-out gate are determined. Using a metric, it is determined if the Miller capacitance effect of a CMOS gate on timing of its fan-out gate and interconnect timing is significant for each fan-out gate. If yes, the gate is replaced with a nonlinear driver model. If no, the gate is replaced with a fixed or dynamic capacitance. Next, if at least one of the fan-out gates is replaced with the nonlinear driver model, the primitive gate is likewise replaced with its corresponding nonlinear model as well. Then, a nonlinear timing simulation is performed on the circuit to generate voltage waveforms at the output of the primitive gate and the input of its fan-out gates that incorporate the effect of the Miller capacitance. However, if none of the fan-out gates are replaced with the nonlinear driver model, a conventional gate and interconnect timing analysis is preferably performed. | 2008-10-30 |
20080270961 | Error correction code (ECC) decoding architecture design using synthesis-time design parameters - Error correction code (ECC) decoding architecture design using synthesis-time design parameters. An approach is presented herein by which an ECC decoding architecture can be designed using synthesis-time design parameters. The manner presented herein allows for a designer to arrive at an ECC decoding architecture in a more direct, straightforward manner that using prior art means. A number of considerations (e.g., architecture parameters, semi-soft design constraints, parallel implementation, etc.) are initially provided; certain or all of these considerations can be predetermined, determined adaptively, and/or modified during the design process. A designer is provided a means by which a most desirable ECC decoding architecture can be arrived at relatively quickly. | 2008-10-30 |
20080270962 | STATIC TIMING SLACKS ANALYSIS AND MODIFICATION - A method, system and computer program product for analyzing and modifying a static timing slack of a timing path in a static timing analysis of a design of an integrated circuit (IC) with a transient power supply are disclosed. A static timing slack analysis is performed at a selected endpoint in an IC to obtain a candidate timing path leading to the endpoint with a worst static timing slack. A transient static timing slack is determined for the candidate timing path for each clock cycle of a clock signal under the transient power supply. The determined transient static timing slack is used to adjust the timing of the IC and to modify the static timing slack of the candidate timing path. | 2008-10-30 |
20080270963 | SYSTEM AND COMPUTER PROGRAM FOR VERIFYING PERFORMANCE OF AN ARRAY BY SIMULATING OPERATION OF EDGE CELLS IN A FULL ARRAY MODEL - A system and computer program for verifying performance of an array by simulating operation of edge cells in a full array model reduces the computation time required for complete design verification. The edge cells of the array (or each subarray if the array is partitioned) are subjected to a timing simulation while the center cells of the array are logically disabled, but remain in the circuit model, providing proper loading. Additional cells are specified for simulation if calculations indicate a worst-case condition due to a non-edge cell. Wordline arrivals are observed to determine worst-case rows for selection. For write operations, the difference between the wordline edges and the data edges is used to locate any non-edge “outlier” cells. For read operations, the wordline delays are summed with the bitline delays determined from edge column data to locate any outliers. | 2008-10-30 |
20080270964 | Integrated Power Supply System Analysis System, Integrated Power Supply System Analysis Method, and Multilayer Printed Circuit Board - Information related to a structure of a multilayer printed circuit board, a physical constant and a mesh is input (Step S | 2008-10-30 |
20080270965 | METHOD OF REDUCING PEAK POWER CONSUMPTION IN AN INTEGRATED CIRCUIT SYSTEM - A method that utilizes connectivity and/or timing information among a plurality of design partitions of an circuit system to create a clock system that reduces peak power consumption across the system. The method includes sorting the design partitions according to a connectivity model, a timing model, or both, and assigning interleaved clock signals as a function of the design partition ordering. The clock system is created as a function of the interleaved clock signals. | 2008-10-30 |
20080270966 | METHOD AND SYSTEM FOR UNFOLDING/REPLICATING LOGIC PATHS TO FACILITATE MODELING OF METASTABLE VALUE PROPAGATION - A net of an integrated circuit design is analyzed by unfolding paths on the receive side of an asynchronous boundary to facilitate modeling of the propagation of a metastable value from a receive latch to sinks of the net. The paths are unfolded by replicating combinational logic and wiring along the coincident portions to form non-intersecting, separate paths from the receive latch to two or more sinks. Common data or control inputs are provided for the gates in the replicated combinational logic. Driver logic may additionally be inserted along each replicated path, upstream of the combinational logic, to independently drive each of the sinks. | 2008-10-30 |
20080270967 | Net list producing device producing a net list with an interconnection parasitic element by hierarchical processing - A memory cell information producing unit obtains physical terminal coordinates, physical terminal names and logical terminal names of a memory cell and layout data, and operates based on them to specify parasitic elements parasitic on interconnections of the memory cell, and to produce memory cell information including the physical terminal names and representing physical properties and a connection relationship of inner elements of the memory cell and the parasitic elements. Memory cell array information producing unit obtains connection information determining the connection relationship of physical terminals of the memory cell, assigns node names to the physical terminals of the memory cell based on the connection information, and produces memory cell array information representing the node names of all the memory cells. A memory cell array net list producing unit produces a net list of the memory cell array formed of the memory cell information and the memory cell array information. | 2008-10-30 |
20080270968 | APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING VERTICALLY COUPLED NOISE CONTROL THROUGH A MESH PLANE IN AN ELECTRONIC PACKAGE DESIGN - A method, apparatus and computer program product are provided for implementing vertically coupled noise control through a mesh plane in an electronic package design. Electronic package physical design data are received. Instances of vertically coupled noise in the electronic package physical design data are identified. The identified instances of vertically coupled noise are quantified. Then the electronic package physical design data are modified to limit the vertically coupled noise. | 2008-10-30 |
20080270969 | METHOD FOR CORRECTING PHOTOMASK PATTERN - A method for correcting a photomask pattern is provided. The correcting method performs a verification of a focus-exposure matrix (FEM) and an overlay variation on a layout area having contact holes or vias in a layout pattern so as to generate a hint information. The layout pattern of the photomask is corrected according to the hint information to prevent the contact holes or vias from being exposed in arrangement to corresponding metal layer, poly layer, or diffusion layer. | 2008-10-30 |
20080270970 | Method for processing pattern data and method for manufacturing electronic device - A method for processing data for a mask pattern. The method includes analyzing data of the mask pattern and specifying a pattern region having a predetermined shape and a predetermined dimension from the mask pattern. The pattern region functions as an alignment mark. | 2008-10-30 |
20080270971 | APPLICATION-REQUIREMENT BASED CONFIGURATION DESIGNER FOR DISTRIBUTED COMPUTING SYSTEMS - Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system. | 2008-10-30 |
20080270972 | METHODS FOR TYPE ANALYSIS IN SYSTEMS FOR CODE GENERATION - A method for identifying a structure of a type to generate a model of the type includes the step of providing at least one replacement type for a basic type provided by a programming language. An identification of initialization, by a constructor, of an instance of the at least one replacement type is received. A type model comprising a description of a data layout of the instance of the type is generated responsive to the received identification. | 2008-10-30 |
20080270973 | DERIVING GROUNDED MODEL OF BUSINESS PROCESS SUITABLE FOR AUTOMATIC DEPLOYMENT - A business process ( | 2008-10-30 |
20080270974 | Enterprise JavaBeans Metadata Model - A method and system to construct Java representations of metadata in an enterprise application. The system extracts metadata from application source code and deployment descriptors to construct a single output available to the application. | 2008-10-30 |
20080270975 | Method and System for Modeling and Naming a Software Class - A method for modeling classes to create an application in an object-oriented programming environment based on a hierarchical rooted classification (E) and inheritance-based naming of an entity is disclosed. The method comprising in the logic classification (EB), on a first level, determining whether the entity belongs to a single-element class (EBU) or a multiple-element class (EBG) and providing a first indication therefor; on a second level, if the entity belongs to a single-element class (EBU), determining whether the entity is one of a data (I), a link (L), a role (R) and a domain (D) and providing a second indication therefor; and creating a name for the entity by aggregating the first and the second indications. A method for modeling classes also based on exemplary class assembly models for behavior such as group, role and transaction is also disclosed. There is also disclosed a method for creating pseudo-code comprising: creating classes according to the method for modeling classes as disclosed above; creating a class assembly model for each model/package-group class; assembling said classes into package-group classes according to said model/package-group classes; and creating pseudo-code from said classes. | 2008-10-30 |
20080270976 | MANAGEMENT OF GRAPHICAL INFORMATION NOTES - Provided are a method, system, and article of manufacture, wherein information is associated with a program element that is capable of being processed in a software environment generated by an operating system. A graphical information note application is executed in response to a processing of the program element in the software environment. A graphical information note that includes the associated information is displayed, in response to the execution of the graphical information note application. | 2008-10-30 |
20080270977 | SYSTEM AND METHOD FOR AUTOMATED ON-DEMAND CREATION OF A CUSTOMIZED SOFTWARE APPLICATION - A web-based interface is provided for visually modeling a business-to-business or application integration process by selecting and associating predetermined process-representing visual elements. A customized, enterprise-specific executable software application (“dynamic runtime engine”) is automatedly produced by software running remotely. The dynamic runtime engine is created to include a generic application template, predefined “stock” codesets selected as a function of the modeled process, and a data profile codeset that includes input provided by the user for customizing the stock components for a specific integration process of a specific enterprise. The application template and selected codesets may subsequently be downloaded to provide an executable dynamic runtime engine software application that is customized to perform a specific integration process for a specific enterprise. Thus, the dynamic runtime engine software application is created automatedly outside of an enterprise's computing network, but is customized for a specific enterprise before it arrives within the enterprise's computing network or other destination network. | 2008-10-30 |
20080270978 | Automating applications in a multimedia framework - The present invention provides a multimedia software framework system that allows development of customized multimedia plug-in applications for use within the system. Users can customize fields in the data entry, database, query and report forms without any programming effort. The information is packaged in an Application plug-in module which can be transported to any personal computer or network server. The information can be integrated into a core multimedia framework with features for video capturing, image processing, video and image broadcasting, entity work space elaboration, and instant multimedia messaging. The present invention also provides Internet Service Providers with a new opportunity for hosting application servers because the system resources in the core multimedia framework server can be partitioned for different applications and user accounts without any additional programming effort. | 2008-10-30 |
20080270979 | METHODS AND SYSTEMS FOR USING TYPE MODELS TO GENERATE AN IMPLEMENTATION OF A TYPE - A method for using type analysis to generate an implementation of a type includes the step of identifying a request to generate a first implementation of a type. A type model associated with the type is received. A second implementation of the type model is identified as suitable for a high-performance implementation. The second implementation is generated on a target processor. The second implementation is represented as the first implementation. | 2008-10-30 |
20080270980 | RAPID APPLICATION DEVELOPMENT FOR DATABASE-AWARE APPLICATIONS - Embodiments of the invention provide application development tools that allow developers to rapidly build database-aware applications and database unit tests. Embodiments of the invention support multiple scenarios for database-aware application development, including beginning from a database table and automatically creating application code to access the table, beginning from an existing database query, beginning from existing application code that accesses a database, and hybrids or variations of these approaches. | 2008-10-30 |
20080270981 | DETERMINATIOIN OF A SET OF CANDIDATE CODE INSERTIONS FOR INSERTION IN PROGRAM CODE - A code assistance feature provides a user with a set of suggested program code insertions at a given point in the program code being edited. For example, in response to a user command, the feature identifies syntactically correct possible insertions derived from a search for insertions of a compatible type. The feature identifies members in the set of possible code insertions that can be expanded via a field dereference or subroutine call to provide further possible code insertions for selection by the user. | 2008-10-30 |
20080270982 | METHOD FOR AUTOMATING VARIABLES IN END-USER PROGRAMMING SYSTEM - A method for automating variables in an end-user programming system is disclosed. The end-user programming system comprises a script, a shared repository, at least one database, a recorder, an interpreter, and an execution engine. The script comprises at least one command describing an event comprising a data value. Each user has a uniquely identified entry set for the entries distributed in at least one database. The interpreter automatically creates a variable for a data value in a command by comparing the data value with each entry value in the entry set for the user recording the command. The interpreter automatically instantiates a variable in a command with an entry value by comparing the variable with each entry name in the entry set for the user executing the command. | 2008-10-30 |
20080270983 | DATABASE CONNECTIVITY AND DATABASE MODEL INTEGRATION WITHIN INTEGRATED DEVELOPMENT ENVIRONMENT TOOL - Embodiments of the invention provide database integration within an integrated development environment (IDE) tool for displaying database structure and other database information, query editing and execution, and error detection for database statements embedded in program source code. Embodiments of the invention integrate database connectivity and error detection into the IDE tool, thereby potentially reducing the time required for database-aware application development. | 2008-10-30 |
20080270984 | Script program execution device, script program execution method, and optical disk device - A script program execution device comprises an analysis unit which beforehand reads a script program, to analyze a syntax of the script program, before the execution of the script program is instructed, a storage unit which stores a syntax analysis result of the analysis unit, a generation unit which generates an intermediate code from the script program by use of the syntax analysis result stored in the storage unit, when the execution of the script program is instructed, and an execution unit which executes the intermediate code generated by the generation unit. According to this device, an application described in a script language is started and switched at a high speed. | 2008-10-30 |
20080270985 | DATABASE APPLICATION ASSEMBLY AND PREPARATION - A plurality of database application components available in a first components store is received. A plurality of pointers is created with each of the plurality of pointers referencing a selected object, such as the plurality of database application components or an existing pointer to one of the plurality of database application components. The plurality of pointers is collected into a reference group defining a plurality of selected objects included in a database application. In some examples, the database application components include a header, a footer, a control, a fragment, a table, a query, a report, a relation, a form, a conditional formatting statement, a programming component, a validation statement and a module. | 2008-10-30 |
20080270986 | SYSTEM AND METHOD FOR ENTERPRISE JAVABEANS CONTAINER - A system to implement functionality for running Enterprise JavaBeans. The functionality is provided by a set of components. The components include a life cycle manager, a client views manager, a proxy invocation handler, an invocation chain manager, and an invocation context. | 2008-10-30 |
20080270987 | METHOD AND SYSTEM FOR ALLOWING ACCESS TO DEVELOPED APPLICATIONS VIA A MULTI-TENANT ON-DEMAND DATABASE SERVICE - In accordance with embodiments, there are provided mechanisms and methods for allowing access to developed applications via a multi-tenant on-demand database service, in a controlled environment. These mechanisms and methods for providing such access can enable embodiments to provide additional control over the development process as well as the access of such developed applications. The ability of embodiments to provide such additional control may lead to an improved application development framework, etc. | 2008-10-30 |
20080270988 | METHOD AND SYSTEM FOR DEBUGGING A PROGRAM IN A MULTI-THREAD ENVIRONMENT - A method and system for debugging a program in multithread environment which interrupts the running of a debuggee program begins by replacing the instruction at the position at which a breakpoint for debugging is desired to be set with a breakpoint instruction. When the breakpoint instruction is replaced back with the instruction at the position at which the breakpoint for debugging is set, an instruction is set in front of the breakpoint for debugging as a fence breakpoint; and when the instruction at the position at which the breakpoint for debugging is set, is replaced again with the breakpoint instruction. On completion, the fence breakpoint is replaced with the original instruction of the debuggee program at that position. | 2008-10-30 |
20080270989 | DETECTING AND DISPLAYING ERRORS IN DATABASE STATEMENTS WITHIN INTEGRATED DEVELOPMENT ENVIRONMENT TOOL - Embodiments of the invention provide database integration within an integrated development environment (IDE) tool for displaying database structure and other database information, query editing and execution, and error detection for database statements embedded in program source code. Embodiments of the invention integrate database connectivity and error detection into the IDE tool, thereby potentially reducing the time required for database-aware application development. | 2008-10-30 |
20080270990 | Unwinding unwindable code - Unwinding may take place in an annotated unwinding environment with non-annotated code by placing a context frame between a first annotated function and non-annotated function and an unwind thunk between the non-annotated function and a second annotated function. The unwind thunk may redirect an unwind function to the context frame so that an unwind process may continue across a non-annotated function. | 2008-10-30 |
20080270991 | Software tool for detecting plagiarism in computer source code - A method and system for detecting plagiarism of software source code. In one embodiment, a first set of arrays and a second set of arrays are created for a first program source code file and a second program source code file respectively. Each pair of arrays in the first and second sets has entries corresponding to program elements of a distinct program element type such as functional program code, program comments, or program code identifiers. Next, each pair of arrays from the first and second sets is compared to find similar entries, and an intermediate match score is calculated for each pair of arrays based on the similar entries. Further, the resulting intermediate match scores are combined to produce a combined match score, which is then used to provide an indication of copying with respect to the first program source code file and the second program source code file. | 2008-10-30 |
20080270992 | METHOD AND SYSTEM FOR TESTING APPLICATION MODULES USING STATIC TESTS FROM A TEST SUITE - A method and a system for validating a plurality of files via static tests from a test suite are described. The method includes selecting a plurality of static tests from a test suite, executing the plurality of static tests on a plurality of files to validate the plurality of files, and storing records after executing the plurality of static tests to record the validation of the plurality of files. The system includes an application, a plurality of files inside the application, the plurality of files to describe and configure the application, a plurality of static tests to validate the plurality of files, and a framework to apply the plurality of static tests to the plurality of files. | 2008-10-30 |
20080270993 | Computer program testing after source code modification using execution conditions - Computer program testing after source code for the computer program has been modified is performed more quickly, by using execution conditions. First, second, and third execution conditions are determined. These execution conditions are used to perform testing of the program to determine whether the program is properly functioning. Particularly, test data on which basis testing of the computer program is performed can be classified as first test data, second test data, third test data, or fourth test data. The program prior to modification of the source code is tested by employing the first, second, and third test data. After the source code is modified, the program is retested by employing only the third and the fourth test data. The program is thus properly retested after source code modification by employing only the third and the fourth test data, without having to employ the first and the second test data. | 2008-10-30 |
20080270994 | METHOD AND APPARATUS OF PARTITIONED MEMORY DUMP IN A SOFTWARE SYSTEM - A method and apparatus of partitioned memory dump in a software system is provided, the apparatus comprising: a monitor for, during the execution of the software system, monitoring the memory allocations and deallocations of objects in the software system and according to the results of the monitoring, assigning the allocated objects in the software system into corresponding memory partitions, wherein the memory space of the software system is partitioned according to a given partitioning scheme; an event detector for detecting a triggering event of memory dump; and a dumper for dumping related memory partitions according to the detected triggering event of memory dump. Preferably, the apparatus further comprises an analyzer for analyzing the dumped information, and generating a new dump triggering event or a new partitioning scheme based on the analysis results. | 2008-10-30 |
20080270995 | Method for Automatic Detection of Build Regressions - A method and apparatus for automatically performing regression processing on trace data are provided. With the apparatus and method, call tree data structures are generated for two or more executions of two or more builds of a computer program. The apparatus and method perform a “tree-minimization” operation on each set of call tree data structures for each of the builds to generate minimized call tree data structures for each build of the computer program. The minimized call tree data structures are then subtracted from one another to generate a subtracted minimized call tree data structure. From this subtracted minimized call tree data structure, the portions of the computer program that are different from build to build and which appreciably and consistently affect the difference in execution of the computer program from build to build may be identified. Thus, the analyst's attention is directed to these areas of the computer program code which may be optimized in order to obtain better execution of the computer program. | 2008-10-30 |
20080270996 | APPARATUS AND METHOD FOR AUTOMATICALLY EXTRACTING INTERFACE OF EMBEDDED SOFTWARE - Provided is an apparatus and method for automatically extracting an interface of embedded software. The method defines an interface of embedded software as a test item for test of the interface of the embedded software, and generates an interface symbol corresponding to the defined test item. The location of the interface symbol is determined, and a test case is generated based on the interface symbol and its location in the software. Embodiments of the invention thus facilitate the testing of software at interfaces between layers in the software. | 2008-10-30 |
20080270997 | Automatic data manipulation to influence code paths - Software development and testing systems use adaptive feedback to construct an input dataset for a target program. The target's operation is monitored to identify significant events that correlate with the input dataset. Critical events are detected and reported to a user. Various methods of implementing the adaptive feedback, and systems that can be tested using these methods, are also described. | 2008-10-30 |
20080270998 | Application integration testing - Application testing is disclosed. A definition of a test to be performed on a subject application is received in a generic form not specific to the subject application. The test is performed by exchanging data with the subject application, as required to perform the test, using a test connector application associated with the subject application to do at least one of (1) convert an input data to be supplied to the subject application during the test from a generic data format not specific to the subject application into an application-specific data format associated with the subject application, if the application-specific data format is different than the generic data format and (2) normalize an output data received from the subject application in the application-specific data format into the generic data format not specific to the subject application, if the application-specific data format is different than the generic data format. | 2008-10-30 |
20080270999 | System And Method For Extending Capabilities And Execution Efficiency Of Script Based Applications - Scripting Language based applications can be limited in their ability to supply and execute sophisticated logic and complex processing. More traditional programming languages contain explicit function and/or procedure calls to implement more complex functionality, however, these languages use more complicated syntax and traditionally require mosophisticated programming knowledge to use. There are provided systems and methods for extending the capabilities of an application program for execution by a terminal. The application includes a script based workflow and non-executable content. One such method comprises loading the workflow for interpretation by a script interpreter, such that the workflow is configured for having a plurality of executable elements. This method also provides a global symbol structure for reference by the executable elements, the global symbol structure including addressing for coupling selected ones of the executable elements to corresponding external components. The external components are provided by a native runtime environment of the terminal for performing the action specified by the selected executable elements. This method also executes the executable elements in sequence such that execution of the selected ones of the execution elements are redirected to the respective external components through the corresponding global symbols of the global symbol structure. Predefined knowledge of the contents of the global symbol structure is shared by the runtime environment and the workflow of the application. | 2008-10-30 |
20080271000 | Predicting Conflicts in a Pervasive System - A method of predicting conflicts in a system is described which uses a process calculus to describe programs and actions within the system. The source code for programs is transformed into an expression in the process calculus and then the reduction rules for the process calculus can be applied to the expressions for the various programs and actions. Analysis of the resultant reduced expression(s) enables potential conflicts to be identified. | 2008-10-30 |
20080271001 | METHOD OF GENERATING PROGRAM, INFORMATION PROCESSING DEVICE AND MICROCOMPUTER - In programming in high-level language, a method of generating a program supporting external specifications for generating secure codes having high tamper-resistance and automatically generating an executable program having tamper-resistance with regard to a portion designated by a user is provided. A syntax analysis step, an intermediate representation generation step, a register allocation step, an optimization processing step, an assembly language generation step, a machine language generation step and a machine language program linkage step are executed. And between finish of reading of the source program and generating the executable program, a tamper-resistant code insertion step of automatically generating a code having tamper-resistance coping with unjust analysis of an operation content of the executable program is executed to the source program, the intermediate representation, the assembly language program or the machine language program based on an instruction of a user. | 2008-10-30 |
20080271002 | SYSTEM AND METHOD FOR PROVIDING A FILTERING CLASSLOADER IN A COMPUTER ENVIRONMENT - A system and method for providing a filtering classloader within a Java-based or other application environment. In one embodiment, a filtering classloader is placed between two other classloaders, e.g. between the system classloader and the application classloader. The filtering classloader is provided with a set of patterns which throw a “class not found exception” if an application makes a request for that class or package. The exception leads the application classloader to believe (perhaps correctly) that there is no class with that name in the system classloader. The application classloader then loads the class itself. The class may or may not exist in the system classloader; the filtering classloader in essence overrides any retrieval from that classloader in favor of the application classloader, for certain specified patterns of request. | 2008-10-30 |
20080271003 | Balancing Computational Load Across a Plurality of Processors - Computational load is balanced across a plurality of processors. Source code subtasks are compiled into byte code subtasks whereby the byte code subtasks are translated into processor-specific object code subtasks at runtime. The processor-type selection is based upon one of three approaches which are 1) a brute force approach, 2) higher-level approach, or 3) processor availability approach. Each object code subtask is loaded in a corresponding processor type for execution. In one embodiment, a compiler stores a pointer in a byte code file that references the location of a byte code subtask. In this embodiment, the byte code subtask is stored in a shared library and, at runtime, a runtime loader uses the pointer to identify the location of the byte code subtask in order to translate the byte code subtask. | 2008-10-30 |
20080271004 | COMPUTER-IMPLEMENTED METHOD, SYSTEM, AND PROGRAM PRODUCT FOR OPTIMIZING A DISTRIBUTED APPLICATION - A computer-implemented method, system, and program product for optimizing a distributed (software) application are provided. Specifically, a configuration of a target computing environment, in which the distributed application is deployed, is discovered upon deployment of the distributed application. Thereafter, based on a set of rules and the discovered configuration, one or more optimization techniques are applied to optimize the distributed application. In a typical embodiment, the set of rules can be embedded in the distributed application, or they can be accessed from an external source such as a repository. Regardless, the optimization techniques applied can include at least one of the following: (1) identification and replacement of an underperforming component of the distributed application with a new component; (2) generation of interface layers (to allow selection of optimal bindings) between distributed objects of the distributed application; and/or (3) execution of code transformation of the distributed application using program analysis techniques. | 2008-10-30 |
20080271005 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR REDUCING NUMBER OF EXCEPTION CHECKS - Based on operations within an uncounted loop of source code, one or more calculations are generated for determining, at runtime, an expected number of iterations through which the uncounted loop can iterate before encountering an exception corresponding to at least one target exception check. A copy of the uncounted loop omitting each target exception check is generated. The uncounted loop, the copy of the uncounted loop, and the one or more calculations are arranged in compiled code so that at runtime program flow enters the copy of the uncounted loop. If a maximum number of iterations of the copy of the uncounted loop is reached, program flow proceeds from the copy of the uncounted loop to the uncounted loop. The maximum number of iterations is no more than the smallest member of a set consisting of the expected number of iterations for each target exception check. | 2008-10-30 |
20080271006 | Technologies for Code Failure Proneness Estimation - The present examples provide technologies for estimating code failure proneness probabilities for a code set and/or the files that make up the set. The code set being evaluated is typically comprised of binary and/or source files that embody the software for which the estimates are desired. The estimates are typically based on a set of selected code metrics, the code metrics typically selected based on corresponding failures of a previous version of the software. A historically variant metric feedback factor may also be calculated and code metric values classified relative to a baseline code set embodying the previous version of the software. | 2008-10-30 |
20080271007 | SYSTEM AND METHOD FOR MANAGED TUXEDO WRAPPER FOR .NET APPLICATIONS - A system supports managed wrapping of Tuxedo functions for .NET applications, comprising Wrapper Interfaces and Wrapper Utilities. The Wrapper Interfaces that wrap around one or more Tuxedo functions used by a .NET application are operable to encapsulate the one or more unmanaged Tuxedo libraries and provide connectivity between the one or more unmanaged Tuxedo libraries and the .NET application. The Wrapper Utilities are operable to build .NET applications using the Wrapper Interfaces, wherein the .NET applications are operable to invoke the one or more unmanaged Tuxedo libraries through Wrapper Interfaces to run under Common Language Runtime (CLR). | 2008-10-30 |
20080271008 | SYSTEM AND METHOD FOR DYNAMIC DISCOVERY AND DEFINITION OF MAPPINGS OF PARAMETERS USED BY SERVICE ORIENTED ARCHITECTURE SERVICES AT RUNTIME - Exemplary illustrative embodiments provide for a method implemented in a service oriented architecture environment including a plurality of live services. The method includes composing, at runtime, a composed service by mapping a first parameter of a first subset of live services to a second parameter of a second subset of live services. The first subset and the second subset are part of the plurality of live services. The method can further include storing the composed service in a memory. | 2008-10-30 |
20080271009 | SOFTWARE UPGRADE CONTROL METHOD AND BROADCAST RECEIVING APPARATUS USING THE SAME - A software upgrade control method and a broadcast receiving apparatus using the same. The software upgrade control method includes externally transmitting information relating to a card installed to the broadcast receiving apparatus and used for broadcast processing; and controlling upgrade of software of the card based on the received software upgrade which corresponds to the information relating to the installed card. Accordingly, even when the type of the card installed to the broadcast receiving apparatus varies, the correct software of the card can be upgraded. | 2008-10-30 |
20080271010 | Method and device for updating medical apparatus - The method and the device are used for updating a medical apparatus that has a memory for an operating program. The memory is at least partially designed as a variable memory and is connected with an input device for a current operating program. The memory and the input device are connected to control devices, which have testing means for evaluating at least one code. At least one function of the apparatus is released only when the code agrees with a reference value. | 2008-10-30 |
20080271011 | Method and Apparatus for a Client Call Service - A method, apparatus, and computer instructions for providing access to an application. An operating system is identified on the client responsive to receiving a request for access to the application from a client. An appropriate version of the application for the client is selected in response to identifying the operating system. The files required on the client are sent for execution of the appropriate version of the application to the client. A billing process is initiated to identify an amount time during which the appropriate version of the application is used on the client. | 2008-10-30 |
20080271012 | SYSTEM AND METHOD OF GENERATING CUSTOMIZED DOCUMENTATION FOR A SOFTWARE PRODUCT - A system and method for creating customized documentation is disclosed. The method comprises storing one or more documents such that each of the one or more documents corresponds to one of a plurality of versions of a software product. The version of the software product which is installed in an installation environment is detected. The configuration of the installation environment is also detected. At least one document from the one or more documents that corresponds to the version of the software product installed in the installation environment is selected. A subset of the selected document that includes the version of the software product installed in the installation environment and the configuration of the installation environment is then determined. A customized document is composed, based on one or more subsets of the selected document. | 2008-10-30 |
20080271013 | Method for Installing a Computer Operating System through Add-on Disk Image Files - A method for reducing file storage area includes duplicating a original disk image file of an operating system to a storage device of a computer, duplicating a plurality of add-on disk image files to the storage device, and installing the original disk image file of the operating system and at least one add-on disk image file to the storage device of the computer. The plurality of add-on disk image files are different language packages, different package specific software or different SKU packages. | 2008-10-30 |
20080271014 | Lightweight World Switch - In one embodiment, a processor comprises one or more registers coupled to an execution core. The registers are configured to store an intercept configuration that identifies which of a plurality of intercept events are enabled for intercept during guest execution. Additionally, the intercept configuration identifies, for each enabled intercept event, which of at least two exit mechanisms are to be used in response to detection of the enabled intercept event. The execution core is configured to detect one of the enabled intercept events during execution of a guest and to exit the guest using the exit mechanism identified in the intercept configuration for that detected, enabled intercept event. | 2008-10-30 |
20080271015 | VIRTUAL MACHINE CONTROL - A method comprises receiving a request for data from a client computer. The method further comprises obtaining an identifier of a virtual machine. The virtual machine identifier is associated with the requested data. The method further comprises providing the virtual machine identifier to the client computer. | 2008-10-30 |
20080271016 | HYPERVISOR WITH CLONING-AWARENESS NOTIFICATIONS - A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining. | 2008-10-30 |
20080271017 | Managing Virtual Machines Using Shared Image - A method for managing a computing system comprises identifying read-only portions of a file system, sharing the read-only portions of the file system among a plurality of virtual machines, and managing the shared read-only portions of the file system as a single unit. | 2008-10-30 |
20080271018 | System and Method for Managing an Assurance System - An assurance system for creating and evaluating a plurality of virtual application environments that emulate and evaluate a plurality of target systems. Information such as network configuration, interface information, and software packages or subsystems are imported into the virtual application environments. The assurance system may be used for purposes of testing, and delivering comprehensive reports of the likely results on the target systems based on results from the virtual application environments, including such things as configuration changes to the environments, environment load and stress conditions, environment security, software installation to the environments, and performance levels of the environments among other things. | 2008-10-30 |
20080271019 | System and Method for Creating a Virtual Assurance System - An assurance system for creating and evaluating a virtual application environment that emulates and evaluates a target system. Information such as network configuration, interface information, and software packages or subsystems are imported into the virtual application environment. The assurance system may be used for purposes of testing, and delivering comprehensive reports of the likely results on the target system based on results from the virtual application environment, including such things as configuration changes to the environment, environment load and stress conditions, environment security, software installation to the environment, and environment performance levels among other things. | 2008-10-30 |
20080271020 | System and method for working in a virtualized computing environment through secure access - A personalized virtual computing system includes a plurality of client personal computers (PCs), each comprising at least a web browser and a communications client, a plurality of virtual machine hosts each comprising a communications server for communicating with the client PCs via said communications client, a web server comprising a client-customized web site, a directory database including identification information of authorized users and a database including a reservation table. | 2008-10-30 |
20080271021 | MULTI CORE OPTIMIZATIONS ON A BINARY USING STATIC AND RUN TIME ANALYSIS - An apparatus and method provide for profile optimizations at a binary level. Thread specific data may be used to lay out a procedure in a binary. In one example, a hot thread may be identified and a layout may be generated based on the identified hot thread. Also, threads of an application may be ranked according to frequency of execution of the corresponding threads. The layout may be created based on the different threads of differing frequency of execution and conflicts between a hottest thread and each of the other threads of the application. In another example, different threads of the application may conflict. For example, two threads may contain operations that overlap temporally to create a race condition. A layout of the application threads may be created based on conflicting threads. | 2008-10-30 |
20080271022 | UTILIZING GRAPHS TO DETECT AND RESOLVE POLICY CONFLICTS IN A MANAGED ENTITY - A method and system are disclosed for changing the structure of one or more policies and/or the order of application of one or more policies to resolve conflicts among a set of policies using graph-theoretic techniques. Policies are used to govern the states of managed entities (e.g., resources and services). The set of states of the set of managed entities are represented as nodes of a graph. The output of the set of applicable policies governing all or part of the nodes is then used to control the transition between some or all nodes in the graph. | 2008-10-30 |
20080271023 | DEVICE MANAGEMENT - A framework whereby mobile terminals are configured and managed by a central server. In accordance with one aspect of the present invention, there is provided a mobile telecommunications terminal including a first execution environment and a second execution environment, each execution environment being arranged to execute a respective device management agent and each agent issuing, in accordance with instructions from a device management server, management actions that act upon one or more respective management entities running within one or more of the execution environments; wherein the management entities of the second execution environment are grouped into a management structure, the management structure being one of the management entities within the first execution environment, whereby the he first and second execution environments permit the device management server is permitted to manage applications and/or services running within both. | 2008-10-30 |
20080271024 | Information processing apparatus, information processing system and information processing method for processing tasks in parallel - In a micro processor unit, when processing to be requested to another processor unit which connects via a network, occurs during task processing in a task processing unit in an application SPU, a communication controller in a PU specifies a network with which a processor unit, which is a request destination, connects. An interface selector in the application SPU selects one network included in the specified networks, with the view of communication capability or the like, and writes that information in a look-aside buffer. In case that processing for the same processing target is requested next time and after that, a system SPU or the PU transmits the processing request depending on required communication capability. | 2008-10-30 |
20080271025 | SYSTEM AND METHOD FOR CREATING AN ASSURANCE SYSTEM IN A PRODUCTION ENVIRONMENT - An assurance system for testing the functionality of a computer system by creating an overlay of the computer system and routing selected traffic to the overlay while assessing the performance of the system. The system may be used for purposes of managing the testing of the computer system and delivery of comprehensive reports of the likely results on the computer system based on results generated by the assurance system, including such things as configuration changes to the environment, environment load and stress conditions, environment security, software installation to the environment, and environment performance levels among other things. | 2008-10-30 |
20080271026 | Systems and Media for Controlling Temperature in a Computer System - Systems and media for controlling temperature of a system are disclosed. More particularly, hardware, software and/or firmware for controlling the temperature of a computer system are disclosed. Embodiments may include receiving component temperatures for a group of components and selecting a component to perform an activity based at least partially on the component temperatures. In one embodiment, the lowest temperature component may be selected to perform the activity. Other embodiments may provide for determining an average temperature of the components, and if the average temperature exceeds a threshold, delaying or reducing the performance of the components. In some embodiments, components may include computer processors, memory modules, hard drives, etc. | 2008-10-30 |
20080271027 | Fair share scheduling with hardware multithreading - An embodiment of the invention provides an apparatus and method for fair share scheduling with hardware multithreading. The apparatus and method include the acts of: executing, by a first hardware thread in a processor core, a first software thread belonging to a fair share group; and permitting a second hardware thread in the processor core to execute a second software thread if that second software thread belongs to the fair share group. | 2008-10-30 |
20080271028 | INFORMATION PROCESSING APPARATUS - According to one embodiment, an information processing apparatus, executing a process including a plurality of threads for reproduction of moving image data, includes a storage unit which stores priority information indicating a priority of a process of each of threads upon executing the process of the plurality of threads, and a processing unit which reads the priority information from the storage unit, reads the read priority information as a definition file, and executes the process of each of the threads in accordance with the priority information of the definition file. | 2008-10-30 |
20080271029 | Thread Scheduling with Weak Preemption Policy - Thread scheduling with a weak preemption policy is provided. The scheduler receives requests from newly ready work. The scheduler adds a “preempt value” to the current work's priority so that it is somewhat increased for preemption purposes. The preempt value can be adjusted in order to make it more, or less, difficult for newly ready work to preempt the current work. A “less strict” preemption policy allows current work to complete rather than interrupting the current work and resume it at a later time, thus saving system overhead. Newly ready work that is queued with a better priority than the current work is queued in a favorable position to be executed after the current work is completed but before other work that has been queued with the same priority of the current work. | 2008-10-30 |
20080271030 | Kernel-Based Workload Management - A method for managing workload in a computing system comprises performing automated workload management arbitration for a plurality of workloads executing on the computing system, and initiating the automated workload management arbitration from a process scheduler in a kernel. | 2008-10-30 |
20080271031 | Resource Partition Management in Kernel Space - A method for managing resources in a computing system comprises providing a process initiation function which initiates a process and executing from a kernel an application manager that places the process into a resource partition at process initiation. | 2008-10-30 |
20080271032 | Data Processing Network - A grid type network comprising a grid controller for receiving data in the form of a queue from a database. The grid controller is arranged to divide the data into a plurality of batches and dispatch the batches between a plurality of terminals which may be registered with the grid controller. Each terminal is registered on the basis that it contains a processing unit which is usually in an idle state. The terminals are also provided with processing logic related to the processing to be carried out on the batches. The plurality of terminals perform the processing on the batches and on completion, the database is updated with processed data. | 2008-10-30 |
20080271033 | INFORMATION PROCESSOR AND INFORMATION PROCESSING SYSTEM - According to one embodiment, an information processing apparatus in which software resources are divided into first through N-th groups each of which has an operating system, a program operating on the operating system, and data, includes an execution section configured to simultaneously execute the groups with the groups isolated from one another, an OS activating section configured to operate on the operating system of the first group and activate the operating system of at least one of the second through N-th groups according to activation information, an activation information changing section configured to make communication with an administrative server over a network and change the activation information in response to an instruction from the administrative server, and a lock section configured to disable the operating system and the program of each of the second through N-th groups to change the activation information. | 2008-10-30 |
20080271034 | RESOURCE ALLOCATION SYSTEM, RESOURCE ALLOCATION METHOD, AND RESOURCE ALLOCATION PROGRAM - Disclosed is a resource allocation system including a provisional allocation execution unit that executes provisional allocation for policies other than a policy corresponding to an accepted source request, a shared resource extraction unit that extracts a resource sharable between the policy and other policies, and a determination index calculation unit that calculates an index that depends on resource sharability, and determines an allocation destination so that a storage area is allocated on a storage device with a lower resource sharability in preference to other storage devices. | 2008-10-30 |
20080271035 | Control Device and Method for Multiprocessor - An multiprocessor control device according to an example of the invention comprises a selection unit which, on the basis of an execution schedule for tasks to be allocated to any one of processor elements, selects, for each of the processor elements, any one of a normal mode used in a task execution time, a first mode which is used when a task is not executed and in which a power consumption is reduced more than in the normal mode, and a second mode which is used when the task is not executed and which has a greater power consumption reducing effect but a longer mode switching time than the first mode, and a mode control unit which performs control according to the mode selected by the selection unit for each of the processor elements. | 2008-10-30 |
20080271036 | METHOD AND APPARATUS FOR ASSIGNING FRACTIONAL PROCESSING NODES TO WORK IN A STREAM-ORIENTED COMPUTER SYSTEM - An apparatus and method for making fractional assignments of processing elements to processing nodes for stream-based applications in a distributed computer system includes determining an amount of processing power to give to each processing element. Based on a list of acceptable processing nodes, a determination of fractions of which processing nodes will work on each processing element is made. To update allocations of the amount of processing power and the fractions, the process is repeated. | 2008-10-30 |
20080271037 | METHOD AND APPARATUS FOR LOAD BALANCE SERVER MANAGEMENT - A computer implemented method, apparatus, and computer usable program code for balancing management loads. Loads are analyzed for a plurality of hardware control points to form an analysis in response to receiving a notification from a hardware control point indicating that a new manageable data processing system has been discovered. One of the plurality of hardware control points is selected using the analysis to form a selected hardware control point. The message is sent to the selected hardware control point to manage the new manageable data processing system, wherein the selected hardware control point manages the new manageable data processing system. | 2008-10-30 |
20080271038 | SYSTEM AND METHOD FOR EVALUATING A PATTERN OF RESOURCE DEMANDS OF A WORKLOAD - A method comprises receiving, by pattern evaluation logic, a plurality of occurrences of a prospective pattern of resource demands in a representative workload. The method further comprises evaluating, by the pattern evaluation logic, the received occurrences of the prospective pattern of resource demands, and determining, by the pattern evaluation logic, based on the evaluation of the received occurrences of the prospective pattern of resource demands, how representative the prospective pattern is of resource demands of the representative workload. | 2008-10-30 |
20080271039 | SYSTEMS AND METHODS FOR PROVIDING CAPACITY MANAGEMENT OF RESOURCE POOLS FOR SERVICING WORKLOADS - A method comprises receiving, by a capacity management tool, a capacity management operation request that specifies a resource pool-level operation desired for managing capacity of a resource pool that services workloads. The capacity management tool determines, in response to the received request, one or more actions to perform in the resource pool for performing the requested capacity management operation in compliance with defined operational parameters of the workloads. The method further comprises performing the determined one or more actions for performing the requested capacity management operation. | 2008-10-30 |
20080271040 | Method for managing message flow in a multithreaded, message flow environment - In one form, a method for managing message flow includes processing messages concurrently by processing nodes in a computer software application. The processing nodes include at least one set of lock acquisition, system resource access and lock release nodes interconnected in a flow path. In such a set, the nodes are interconnected in a flow path and process a respective one of the messages in a sequence defined by the flow path. The processing includes granting access to a system resource exclusively for the set's respective message responsive to the lock acquisition node processing its respective message. The system resource is accessed for the message responsive to the set's system resource node processing the message. The accessing of the resource for the message includes changing a certain system state. The exclusive accessing of the system resource is released responsive to the set's lock release node processing the message. | 2008-10-30 |
20080271041 | PROGRAM PROCESSING METHOD AND INFORMATION PROCESSING APPARATUS - According to one embodiment, a program processing method includes converting parallel execution control description into graph data structure generating information, extracting a program module based on preceding information included in the graph data structure generating information when input data is given, generating a node indicating an execution unit of the program module for the extracted program module, adding the generated node to a graph data structure configured based on preceding and subsequent information defined in the graph data structure generating information, executing a program module corresponding to a node included in a graph data structure existing at that time, by setting values for the parameter, based on performance information of the node when all nodes indicating a program module defined in the preceding information have been processed, and obtaining and saving performance information of the node when a program module corresponding to the node has been executed. | 2008-10-30 |
20080271042 | TESTING MULTI-THREAD SOFTWARE USING PRIORITIZED CONTEXT SWITCH LIMITS - Testing multithreaded application programs for errors can be carried out in an efficient and productive manner at least in part by prioritizing thread schedules based on numbers of context switches between threads therein. In particular, each thread schedule in a multithreaded application program can be prioritized based on whether a given thread schedule has the same as or less than some maximum value. A model checker module can then iteratively execute thread schedules that fit within a given context switch maximum value, or a progressively higher value up to some limit. In one implementation, for example, the model checker module executes all thread schedules that have zero preempting context switches, then all thread schedules that have only one preempting context switch, etc. Most errors in an application program can be identified by executing only those thread schedule with relatively few preempting context switches. | 2008-10-30 |
20080271043 | Accurate measurement of multithreaded processor core utilization and logical processor utilization - An embodiment of the invention provides an apparatus and method for accurate measurement of utilizations in a hardware multithreaded processor core. The apparatus and method perform the acts including: determining idle time spent cycles which are cycles that are spent in idle by a hardware thread in a processor core; determining idle consumed cycles which are cycles that are consumed in the idle time spent cycles, by the hardware thread; and determining at least one of a processor core utilization and a logical processor utilization based upon at least one of the idle time spent cycles (d | 2008-10-30 |
20080271044 | Method and System for Multithreaded Request Dispatching - A method and a system are described that involve processing a request in multiple threads and dispatching the request to a set of applications. The method includes receiving the request, wherein the request contains application context and session data, creating a request context object and associating it with the application context and the session data, storing an identifier of a first thread that processes the request in the request context object associated with the thread, creating a set of threads from the first thread to process the request in parallel threads, each thread in the set having a unique identifier and inheriting the request context object from the first thread, and invoking a request dispatcher on each thread in the set to forward the request to the set of applications. | 2008-10-30 |
20080271045 | PROVIDING LOCALIZED RESOURCES FOR CLIENT-SIDE SCRIPT EXECUTION - The present invention extends to methods, systems, and computer program products for providing localized resources for client-side script execution. Embodiments of the invention facilitate providing culturally localized resources for executing client-side scripts at Web browser. In some embodiments, client-side script reference tags refer to a script handler at the Web server (instead of an actual script). The script handler can a return localized resource sets for use with client-side scripts (that include calls to external resources). Accordingly, execution of client-side scripts can be localized in accordance with resources contain in the localized resource set. In other embodiments, a script manager using a generic script reference to identifying an appropriate localized instance of a script. Client-side script reference tags refer to the appropriate localized instance of the script. Accordingly, execution of a Web page can be localized in accordance with the localizations contained in the localized instance of the script. | 2008-10-30 |
20080271046 | DYNAMICALLY LOADING SCRIPTS - The present invention extends to methods, systems, and computer program products for dynamically loading scripts. Web pages can include references to script loaders that control the loading of other scripts at a Web browser. A script loader can load scripts in accordance with script loading rules that override the default script loading behavior of the Web browser. Script loading rules can cause scripts to load in a different order than encountered in a Web pager, load in parallel, load in a manner that limits cross-domain requests, etc. Script loading rules are configurable such at that a developer can create customized script loading behavior. | 2008-10-30 |