52nd week of 2008 patent applcation highlights part 67 |
Patent application number | Title | Published |
20080320399 | User Management of Display Properties of Shared Display Window in Shared Display Window Environment - Computer implemented method, system and computer usable program code for managing display properties of a shared display window in a shared display window environment, wherein the shared display window environment includes a host for managing display properties of shared display windows in the shared display window environment, and at least one user for receiving shared display windows on a user display. In response to a request of a user of the at least one user, at least one shared display window is detached from the shared display window environment, and the requesting user is enabled to manage display properties of the detached at least one shared display window on the user display of the requesting user independent of the shared display window environment. | 2008-12-25 |
20080320400 | String customization - Techniques are described to provide string customization. In an implementation, a menu document is generated that specifies one or more menu items to be included in a menu that correspond to one or more actions available via code of a module. A string document is generated that specifies one or more strings to represent the one or more menu items in the menu. The menu document and the string document are made available to a client that includes the module to output the menu having the one or more strings to represent the menu items. The one or more strings are selectable to cause a corresponding action to be performed by the module. | 2008-12-25 |
20080320401 | TEMPLATE-BASED DEPLOYMENT OF USER INTERFACE OBJECTS - A system may include reception of a model describing a plurality of user interface elements, modification of a markup language template based on the model, and deployment of the modified template to a runtime environment. Further aspects may include reception of a second model describing a second plurality of user interface elements, transformation of the second model to a metadata model in accordance with a common metadata framework, transformation of the metadata model to a generic runtime model, and transformation of the generic runtime model to a runtime model associated with a runtime environment. | 2008-12-25 |
20080320402 | Device and Method for Generating a User Interface Configuration for a Field Device - A device for generating a user interface configuration for at least one field device, measuring device, in particular a sensor or actuator, is provided. The device comprises a database and a user interface generating device, wherein the database is designed to store a plurality of device data for the field device, and wherein the user interface generating device is equipped to generate a user interface description file that is allocated to the at least one field device in a predeterminable user interface description language. The user interface description language is selectable from at least two user interface description languages. | 2008-12-25 |
20080320403 | Accessing data using its chart symbols - A method for data representation by an icon that graphically depicts numerical relations within the data, comprising (a) deriving a chart of the data; (b) generating an icon as an object comprising a displayable image depicting the chart; and (c) associating the icon with the data. | 2008-12-25 |
20080320404 | METHOD FOR GENERATING OBJECT PROPERTIES RELATED TO USER INTERFACE - A method for generating an object attribute related to a user interface of a digital displaying device is disclosed. The method includes: utilizing a development tool to develop the user interface to generate an editing result; checking the editing result according to a checking rule of the development tool to determine whether the user interface complies with hardware configuration of the digital displaying device, wherein the checking rule corresponds to the hardware configuration of the digital displaying device; generating the object attribute of the user interface according to the editing result; storing the object attribute of the user interface into a description file. | 2008-12-25 |
20080320405 | METHODS AND APPARATUS FOR PROVIDING CONTEXT SENSITIVE TEMPLATES FOR A WEB BASED WORKFLOW DESIGN - The present disclosure provides methods and apparatuses for providing context sensitive templates for a web based workflow design. Using the methods and apparatus herein, users can create business processes using pre-built templates that define process logic via a web browser. This allows business process designers the ability to design processes from any web capable computer. This also allows business process designers to save time when designing a business process, through the use of the pre-built templates. | 2008-12-25 |
20080320406 | IMAGE DISPLAYING APPARATUS, IMAGE DISPLAYING METHOD, PROGRAM FOR EXECUTING IMAGE DISPLAYING METHOD, AND STORAGE MEDIUM STORING PROGRAM - It is controlled to determine priority for each of plural display objects, wherein the priority having plural levels, and to change displays of the plural display objects in the determined priority, in accordance with a display form of an image different from the plural display objects. To achieve this, the present invention provides an image displaying method of displaying the plural display objects on a display unit, the method comprising: determining the priority for each of the plural display objects, and changing the displays of the plural display objects in the determined priority, in accordance with a display form of the image different from the plural display objects. | 2008-12-25 |
20080320407 | Method for Processing Data - The invention relates to a method for processing data, said method comprising a plurality of steps. A plurality of data sources are provided. At least one data access method is provided for accessing the individual data sources, said data sources providing a homogeneously reprocessable data structure. The individual data sources are symbolised on a user interface of a data processing installation, visible to the user. Combination method modules are used to combine data supplied thereto from the homogeneously reprocessable data structures of the data sources or from the results of other combination method modules, and enable a reproduction of the results. The combination method modules are symbolised on the user interface. A method module is used to output or reprocess the results. Said method module for outputting or reprocessing the results is symbolised on the user interface. Any arrangement of the data source symbols and combination method module symbols and the output symbols on the user interface in relation to each other is possible. The arrangement also reflects the sequence of the individual data processing steps. | 2008-12-25 |
20080320408 | Devices, Systems, and Methods Regarding Machine Vision User Interfaces - Certain exemplary embodiments can provide a method, which can comprise, via a coordinator sub-process of a machine vision user interface process, causing a user interface of a machine vision system to be defined. The machine vision user interface process can comprise a plurality of components. The coordinator sub-process can be adapted to provide a set of software objects to one or more of the components. | 2008-12-25 |
20080320409 | Tightly-Coupled Synchronized Selection, Filtering, and Sorting Between Log Tables and Log Charts - In an event detection and monitoring system displaying event data in both tabular and chart formats, the displays of each are tightly-coupled to one another so that when a user selects an event in one format the corresponding event in the other format is highlighted or otherwise emphasized. When a user selects a row containing an event of interest in the event log table, the symbol in the event log chart corresponding to the selected event is simultaneously highlighted. Similarly, when a user selects a symbol in the event log chart corresponding to an event of interest, the row in the event log table containing the corresponding event is simultaneously highlighted. In addition, the rows of the event log table can be sorted and filtered according to predetermined criteria, and the events selected by the filters are highlighted in the chart with indicia distinguishing the filter. | 2008-12-25 |
20080320410 | VIRTUAL KEYBOARD TEXT REPLICATION - The present invention extends to methods, systems, and computer program products for replicating text at a virtual keyboard. Characters submitted to, displayed at, or accumulated for submission to an application data field are echoed at a keyboard data field that is in relatively close proximity to virtual keys used to enter the characters. Thus, a user does not have to alter their field of view to the application data field to determine what was submitted to the application data field, what was entered at the application data field, or what is to be submitted to the application data field. Accordingly, embodiments of the invention permit a user to much more easily see what they typed using a virtual keyboard. The need to alter a visual field of focus between an application data field and a virtual keyboard is significantly reduced, if not eliminated. | 2008-12-25 |
20080320411 | METHOD OF TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to enter text selecting text based upon the number of words in phrases of the text, upon the number of letters in words of the text, or upon other patterns of the text. The method may also involve indexing the selected text, matching text currently being entered by the user into an application to a portion of a segment of the indexed text, and entering a remaining portion of the segment of the indexed text into the application based upon the matching. In many embodiments, the text may be selected from the text entered into any of several applications. In a few embodiments, the text may be selected from sources specified by a user. In further embodiments, the sources may constitute data files. | 2008-12-25 |
20080320412 | Document Processing Device and Document Processing Method - There is a demand for a method for editing a document with improved ease-of-use even if the document has been described in a little-known vocabulary used by a small number of users. | 2008-12-25 |
20080320413 | Dynamic user interface for previewing live content - A dynamic user interface for previewing live content includes multiple tiles. Information for multiple pieces of live content available from a gallery is obtained, and this information is presented in the multiple tiles of the user interface in accordance with a current user interface layout. In accordance with one aspect, this current user interface layout changes automatically over time as the user interface is displayed. In accordance with another aspect, one or more of the multiple tiles is displayed in the user interface more prominently than the other tiles, and which information is to be displayed in the one or more tiles is based at least in part on a received fee. | 2008-12-25 |
20080320414 | EDGE ANTI-ALIASING - Methods and apparatuses for efficient edge anti-aliasing. | 2008-12-25 |
20080320415 | APPARATUS, METHOD AND COMPUTER-READABLE STORAGE MEDIUM FOR ACCESSING MEDIA CONTENT - An apparatus is configured to present a graphical user interface (GUI) that includes category, subcategory and media content fields. The category field identifies therein categories associated with pieces of media content. The apparatus is configured to receive selection of an identified category, and in response thereto, (a) note the selected category in the category field of the GUI; and (b) identify, in the subcategory field of the GUI, subcategories associated with piece of media content, and in the hierarchy, logically underneath the selected category. The apparatus is also configured to receive selection of an identified subcategory, and in response thereto, (a) note the selected subcategory in the subcategory field of the GUI; and (b) identify, in the media content field of the GUI, pieces of media content logically underneath the selected subcategory in the hierarchy. The apparatus is then configured to receive selection of an identified piece of media content. | 2008-12-25 |
20080320416 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCTS FOR POINT OF CONTACT FAMILY SERVICES - An application for providing point-of-contact family services includes providing a plurality of kiosks located at public points-of-contact, each kiosk having at least a computer system, a display, an input device and a network interface. At each of the kiosks, a main menu is presented with selections that include at least one selection for qualifying for assistance. In response to an applicant selecting the selection for qualifying for assistance, a qualifying for assistance data entry form is presented that includes data entry fields and a submit function. The applicant creates an application by inputting data into the qualifying for assistance data entry form, then, in response to the applicant selecting the submit function, the application is electronically mailed to an application server. | 2008-12-25 |
20080320417 | Mail Status Notification System - The present invention provides a mail status notification system including a software application, at least one item of mail, a colour-coded identification means and at least one functional feature whereby the mail status notification system provides a means of enabling a user to quickly and easily identify the status of said mail including whether it has been sent, received, read or the like. | 2008-12-25 |
20080320418 | Graphical User Friendly Interface Keypad System For CAD - The present invention offers an improved GUI interface for CAD software to allow users easy access to menus. A user can execute commands and options with little disruption and with minimal hand movement. The keypad is represented on the computer screen and is called a GUFI (Graphical User Friendly Interface) keypad system. The keypad is a menu having a matrix of graphical buttons. A user selects a computer resource with a spatial input device and clicks the proper context button, the GUFI keypad displays only the functions or commands that pertain to the computer resource selected. The unique GUFI keypad system displays functions and commands in an arrayed, not in a pop-up or pull down menu, but in a pattern relating to the keys on the keyboard. Menu items are accessed through a one to one correspondence with the represented keys mapped to similar physically represented keys. | 2008-12-25 |
20080320419 | Touch Screen Device, Method, and Graphical User Interface for Providing Maps, Directions, and Location-Based Information - A device, method, and graphical user interface for providing maps, directions, and location-based information on a touch screen display are disclosed. | 2008-12-25 |
20080320420 | EFFICIENT CELL SWAPPING SYSTEM FOR LEAKAGE POWER REDUCTION IN A MULTI-THRESHOLD VOLTAGE PROCESS - A method for designing an integrated circuit, comprising the steps of (A) calculating an efficiency value for each of a plurality of equivalent cells in the design; and (B) selecting a number of the plurality of equivalent cells based on the efficiency values. The equivalent cells (i) decrease an overall delay of a path to meet a timing specification, and (ii) minimize an increase in overall leakage current. | 2008-12-25 |
20080320421 | FEATURE EXTRACTION THAT SUPPORTS PROGRESSIVELY REFINED SEARCH AND CLASSIFICATION OF PATTERNS IN A SEMICONDUCTOR LAYOUT - A system, method and program product for searching and classifying patterns in a VLSI design layout. A method is provided that includes generating a target vector using a two dimensional (2D) low discrepancy sequence; identifying layout regions in a design layout; generating a feature vector for a layout region; comparing a subset of sequence values in the target vector with sequence values in the feature vector as an initial filter, wherein the system for comparing determines that the layout region does not contain a match if a comparison of the subset of sequence values in the target vector with sequence values in the feature vector falls below a threshold; and outputting search results. | 2008-12-25 |
20080320422 | Design Rule Checking System - In a design rule checking system for checking whether or not an integrated circuit design complies with design rules specifying limit values for respective geometric parameters, non-binary functions are used to model the way in which systematic yield loss varies with the value of the geometric parameters. This enables a value to be assigned to systematic yield loss in cases where the geometric parameter is compliant with the design rule but takes a value close to the design rule limit. | 2008-12-25 |
20080320423 | SYSTEM AND METHOD TO PROTECT COMPUTING SYSTEMS - A system and method for protecting computing systems, and more particularly a system and method which a dedicated hardware component configured to communicate with a protection program. A computer hardware subsystem includes a memory comprising content. The content is at least a list of files which have been modified within a predetermined period of time. The list of files is a subset of files of a hard drive. A dedicated hardware component is configured to track the files which have been modified and provide a location of the files to the memory. A communication link between the dedicated hardware component and a protection program provides the protection program with the subset of files of the hard drive as referenced by the memory content. The invention is also directed to a design structure on which a circuit resides. | 2008-12-25 |
20080320424 | VALIDATION OF ELECTRICAL PERFORMANCE OF AN ELECTRONIC PACKAGE PRIOR TO FABRICATION - An electrical resistance determination method. Input to the method includes a description of at least one electrical network within a substrate. The description includes specification of a plurality of first ports on a first side of the substrate, and a plurality of second ports on a second side of the substrate, for each electrical network. All of the first ports are electrically isolated from one another. All of the second ports are electrically connected to a common voltage. A computer readable program code, which is executed by a processor of a computer system computes for a first electrical network of the at least one electrical network an electrical resistance between each first port and a port of the second ports. The computer code may also display a perspective plot of the computed electrical resistances as a bar oriented about normal to each first port. | 2008-12-25 |
20080320425 | Method for Verifying Timing of a Circuit with RLC Inputs and Outputs - A single verification tool provides both static timing analysis and timing simulation capabilities targeted at both full-custom and ASIC designs in a unified environment. In various embodiments the verification tool includes the following features: (a) Integrating both static timing analysis and dynamic simulation tools into a single tool, (b) Efficient path search for multi-phase, multi-frequency and multi-cycle circuit in the presence of level sensitive latch, (c) Automatically identifying circuit structure, e.g. complex gate, for timing characterization, (d) Circuit structures at transistor level solved by incorporating function check, (e) Carrying out functional check to filter out failing path and identifying gate with simultaneously changing inputs, (f) Finding maximum operation frequency in the presence of level sensitive latches after filtering out false paths, (g) Crosstalk solver by utilizing the admittance matrix and voltage transfer of RLC part in frequency domain coupled with the non-linear driver in time domain implemented in spice-like simulator, (h) Making use of the correlation between inputs of aggressors and victim to determine switching time at victim's output iteratively. | 2008-12-25 |
20080320426 | Method for Verifying Timing of a Circuit with Crosstalk Victim and Aggressor - A single verification tool provides both static timing analysis and timing simulation capabilities targeted at both full-custom and ASIC designs in a unified environment. In various embodiments the verification tool includes the following features: (a) Integrating both static timing analysis and dynamic simulation tools into a single tool, (b) Efficient path search for multi-phase, multi-frequency and multi-cycle circuit in the presence of level sensitive latch, (c) Automatically identifying circuit structure, e.g. complex gate, for timing characterization, (d) Circuit structures at transistor level solved by incorporating function check, (e) Carrying out functional check to filter out failing path and identifying gate with simultaneously changing inputs, (f) Finding maximum operation frequency in the presence of level sensitive latches after filtering out false paths, (g) Crosstalk solver by utilizing the admittance matrix and voltage transfer of RLC part in frequency domain coupled with the non-linear driver in time domain implemented in spice-like simulator, (h) Making use of the correlation between inputs of aggressors and victim to determine switching time at victim's output iteratively. | 2008-12-25 |
20080320427 | Apparatus and method for integrated circuit design with improved delay variation calculation based on power supply variations - An integrated circuit design apparatus is provided with a power supply voltage variation analysis tool calculating variations of power supply voltages of respective instances integrated within a target circuit; a determination module comparing the variations of the power supply voltages with first and second reference levels, the second reference level being smaller than the first reference level; a redesign module adapted to redesign the target circuit when at least one of the variations of the power supply voltages is larger than the first reference level; a delay variation calculation module adapted to correct circuit delay data of the respective instances based on the variations of the power supply voltages of the respective instances; a static timing analysis tool performing timing verification of the target integrated circuit. The timing verification in connection with each of the instances is performed based on the corrected circuit delay data, when a variation of a power supply voltage of the each of the instances is in a range from the second reference level to the first reference level, and performed based on the circuit delay data uncorrected, when the variation of the power supply voltage of the each of the instances is smaller than the second reference level. | 2008-12-25 |
20080320428 | Minimizing Effects of Interconnect Variations in Integrated Circuit Designs - Roughly described, method and apparatus for laying out an integrated circuit, in which a subject interconnect has predetermined values for a plurality of variables affecting propagation delay of the subject interconnect. The value of an adjustment one of the variables is adjusted to minimize exposure of the propagation delay of the interconnect to process variations causing variations in the value of a subject fabrication variable, and a revised layout is developed in dependence upon the adjusted value for the adjustment variable. In an embodiment, the adjustment is made in dependence upon a pre-calculated “interconnect optimization database” indicating combinations of values for the plurality of variables which have been pre-determined to minimize exposure of interconnect propagation delay to process variations affecting the subject variable. Different databases, or different entries in the same database, can be provided for minimizing exposure of interconnect propagation delay to process variations affecting each subject variable of interest. | 2008-12-25 |
20080320429 | CIRCUIT LAYOUT TOOL DIMMING FEATURE - A computer program product stored on machine readable media including machine executable instructions for display a layout of a circuit design, includes instructions for: receiving designation of at least one design segment from a user; receiving designation of a degree of intensity for at least one of highlighting and dimming the design segments and on a display screen, highlighting the designated design segments and dimming remaining segments on the display. A system is also provided. | 2008-12-25 |
20080320430 | Spare Gate Array Cell Distribution Analysis - A method for determining gate array distribution includes steps or acts of: randomly placing a plurality of test boxes in a logic circuit layout; counting the number of fill cells in each of the plurality of test boxes; recording the count; grouping the plurality of test boxes into two groups: a first group with local clock buffers and a second group without local clock buffers; determining the fill cell percentage of each of the plurality of test boxes; and flagging the test boxes with a poor distribution of gate array cells. | 2008-12-25 |
20080320431 | POWER MESH FOR MULTIPLE FREQUENCY OPERATION OF SEMICONDUCTOR PRODUCTS - The design of integrated circuits, i.e., semiconductor products, is made easier with a semiconductor platform having versatile power mesh that is capable of supporting simultaneous operations having different frequencies on the semiconductor product; e.g., higher frequency operations may be embedded as diffused blocks within the lower layers or may be programmed from a configurable transistor fabric above the diffused layers. Preferably the power mesh is located above the layers having the operations requiring the different frequencies, and may be fixed in an application set given to a chip designer or may be configurable by the designer her/himself. For example, to support high speed communications adjacent an embedded high speed data transceiver, the transistor fabric may be programmed as a data link layer having higher performance requirements than the rest of the integrated circuit. The data link layer may be connected to one of the localized grids of the versatile power mesh which may have an increased density and/or wider strap width of a power/ground grid. Additional decoupling capacitance can be embedded in the lower layers of the semiconductor product and/or can be programmed from the configurable transistors fabric. | 2008-12-25 |
20080320432 | Disabling unused IO resources in platform-based integrated circuits - The present invention is directed to methods for disabling unused IO resources in a platform-based integrated circuit. A slice is received from a vendor. The slice includes an IO circuit unused by a customer. The IO circuit is disabled. For example, when the IO circuit is desired to be tied to a power source, a primary input/output pin of the IO circuit is shorted to a power bus of the IO circuit. When the IO circuit is desired to be tied to a ground source, a primary input/output pin of the IO circuit is shorted to a ground bus of the IO circuit. When the IO circuit is desired to be left floated, a primary input/output pin of the IO circuit is not connected to any bonding pad cell of the slice. Next, the IO circuit is removed from the customer's logic design netlist. The IO circuit is inserted in the vendor's physical design database. | 2008-12-25 |
20080320433 | Coordinated-design supporting apparatus, coordinated-design supporting method, computer product, printed-circuit-board manufacturing method, circuit-design supporting apparatus, circuit-design supporting method, computer product, and printed-circuit- board manufacturing method - An FPGA-design-CAD interface unit retrieves pin assignment information created by an FPGA-designing CAD apparatus. An FPGA-pin-information managing unit manages the pin assignment information as FPGA pin information. A temporary-library creating unit creates a temporary component shape type library by using the FPGA pin information and outputs the temporary component shape type library in a form capable of being read by a package-designing CAD apparatus to a file. | 2008-12-25 |
20080320434 | PHOTOMASK MANAGEMENT METHOD AND PHOTOMASK WASH LIMIT GENERATING METHOD - A photomask is washed and at least one physical amount of transmittance and phase difference of the photomask, dimension of a pattern, height of the pattern and a sidewall shape of the pattern is measured. After this, the two-dimensional shape of a borderline pattern previously determined for the photomask is measured. Lithography tolerance is derived by performing a lithography simulation for the measured two-dimensional shape by use of the measured physical amount. Then, whether the photomask can be used or not is determined based on the derived lithography tolerance. | 2008-12-25 |
20080320435 | OPTICAL PROXIMITY CORRECTION IMPROVEMENT BY FRACTURING AFTER PRE-OPTICAL PROXIMITY CORRECTION - A method for fabricating a mask used to make integrated circuits is provided using an improved OPC process whereby a pre-fracturing OPC process is performed on the target design of the integrated circuit. The pre-fractured OPC design is then fractured and a post-fracturing OPC process performed to make the final mask. Either rule-based OPC or model-based OPC processes can be used for both of the OPC steps or each step can be either side-based or model-based OPC. | 2008-12-25 |
20080320436 | SYSTEM AND METHOD FOR SOFTWARE DEVELOPMENT - This invention relates to a method and apparatus for developing software. In one embodiment, a method for facilitating the distributed development of software components includes providing a skill rating for software developers, communicating specifications for a software component to a subset of the developers, receiving submissions from the developers, scoring the submissions, and selecting one submission to be included in a software repository. In another embodiment, a method for compensating a software developer includes soliciting software developers for the submission of computer software components, receiving software components in response to the solicitation from the developers, evaluating the received software components, selecting one or more of the submissions for potential distribution to the public, and allotting the proceeds from the distribution to the developers. | 2008-12-25 |
20080320437 | Constructing Petri Nets from traces for diagnostics - Various technologies and techniques are disclosed for using Petri Nets for diagnostics of concurrent programs. One or more initial traces are obtained from a concurrent program that executed properly. The initial trace is used to create a Petri Net. To generate the Petri Net, unique task identifiers and places of interest are generated, and transitions are added. The resulting Petri Net is stored for later use in differential debugging. A trace is obtained from a later execution of the concurrent program that did not execute properly. The later trace is run against the Petri Net to identify at least one difference. A Petri Net can also be used for model checking of concurrent programs. A model checking process is performed to analyze possible executions in the Petri Net to look for one or more problems. A result of the model checking process is output. | 2008-12-25 |
20080320438 | Method and System for Assisting a Software Developer in Creating Source code for a Computer Program - In a software development system, a method for assisting a user in creating source code for a computer program in a high-level programming language. The method comprises: at a current user inputting location within a piece of source code under development, detecting ( | 2008-12-25 |
20080320439 | METHOD AND APPARATUS FOR MANAGING VARIABILITY POINTS - Provided are a method and apparatus for managing variability points that represent variability of components of software. The method includes connecting variability points of components to each other and also connecting at least one variability point of the components to a corresponding variability point of at least one of source code and build script; receiving an input having a predetermined value and setting the predetermined value to a variability point of the components; reflecting corresponding values of the predetermined value to the connected variability point of at least one of the source code and build script. | 2008-12-25 |
20080320440 | FULLY CAPTURING OUTER VARIABLES AS DATA OBJECTS - Providing for read/write access to captured free variables expressed as environment data objects is disclosed herein. By way of example, free variables can be rewritten as a field of a private class, and accessed via an instance of the private class captured within the environment data object. In such a manner, no need of a placeholder or proxy function is required to access the free variable. Consequently, the subject innovation provides a simplified method for capturing free variables within expression trees and providing read/write access to such variables. | 2008-12-25 |
20080320441 | EXTENSIBLE RAPID APPLICATION DEVELOPMENT FOR DISPARATE DATA SOURCES - Embodiments of the invention provide an IDE tool that provides rapid application development features for a variety of disparate data sources. Further, developers may customize and extend the rapid application development features to suit their development needs in a particular case. In a particular embodiment, the rapid application development template may be configured to generate a set of configuration files localized used to deploy a “lightweight” application, such as a web-service, to a particular application server. | 2008-12-25 |
20080320442 | Execution-centric source code view - Various technologies and techniques are disclosed for providing an execution-centric view of source code. Source code is reconstructed in an execution-centric format from a prior execution of an application. Trace data is used to determine which code addresses were executed during a prior execution of an application. Addresses in the trace data are mapped back to source code to reconstruct the source code in the execution order. The source code is then displayed in the execution-centric format. Other events that occurred at different points in time can be overlaid in the display of the execution-centric source code. | 2008-12-25 |
20080320443 | WIKI APPLICATION DEVELOPMENT TOOL THAT USES SPECIALIZED BLOGS TO PUBLISH WIKI DEVELOPMENT CONTENT IN AN ORGANIZED/SEARCHABLE FASHION - The present invention discloses a software development system for WIKIs including a WIKI server, a BLOG server, and a data store. The WIKI server can serve WIKI pages to WIKI clients. The BLOG server can serve BLOGs to BLOG clients. The data store can manage WIKI BLOG entries. Each WIKI BLOG entry can include a link to one of the WIKI pages and metadata for the linked WIKI page. The metadata can include a WIKI page title, a WIKI page version, a WIKI page description, design notes, and other information. Searchable keywords can be generated from the metadata. WIKI BLOG entries can be searched by WIKI developers to find WIKI pages having designer specified criteria based on a keyword search. Wherein searching for WIKI BLOG entries and editing discovered WIKI pages associated with WIKI BLOGs can be performed by a WIKI client via a WIKI interface. | 2008-12-25 |
20080320444 | LATE BOUND PROGRAMMATIC ASSISTANCE - Programmatic assistance is provided for dynamic typing within an integrated development environment (IDE). Types associated with late bound constructs can be inferred from static information and/or determined from design time execution. Assistance can then be provided as a function of a precise and/or speculative type. Furthermore, dynamic type assistance can be employed in conjunction with static type assistance to facilitate development of a program that supports both late and early binding, for example. | 2008-12-25 |
20080320445 | SYSTEMS AND METHODS FOR GATHERING AND PROCESSING USER FEEDBACK - A system for enabling submission of user feedback includes an extension to an application that is configured for execution on a computing system. The extension is for operation with the application and may be invoked during execution of the application in order to submit user feedback on a feature of the application substantially contemporaneously with a presentation of the feature to the user during execution of the application. The extension may visually identify a location of the feature on a user's screen and display on the user's screen textual input, received from the user, concerning the feature. | 2008-12-25 |
20080320446 | DEFINING A MIDLET REGION SPACE - Embodiments of the present invention address deficiencies of the art in respect to MIDlet execution in a desktop environment and provide a method, system and computer program product for clip region definition for a MIDlet region space. In one embodiment of the invention, a method for clip region definition for a MIDlet region space can be provided. The method can include extracting a raster image from a MIDlet, computing a clip region from the extracted raster image for the MIDlet, deploying the MIDlet to a desktop environment through an emulator, and applying the clip region to the MIDlet through the emulator to deploy the MIDlet as a widgetized application in the desktop environment. | 2008-12-25 |
20080320447 | METHOD OF ACCESSING WEB PARAMETERS - A method of accessing Web parameters includes: providing a first program code for managing at least one Web parameter, where the Web parameter is stored in a parameter set and the first program code is a light-weight program code; and when a second program code is executed, accessing the Web parameter stored in the parameter set by utilizing the first program code. | 2008-12-25 |
20080320448 | Method and Apparatus for Autonomic Test Case Feedback Using Hardware Assistance for Data Coverage - A method, apparatus, and computer instructions for presenting coverage data relating to data access occurring during execution of code. The coverage data containing data access indicators associated with memory locations is obtained. The data access indicators that have been set by a processor in the data processing system in response to access of the memory locations during execution of the code by the processor are identified to form set data access indicators. Each set instruction access indicator is associated with a portion of the memory locations allocated for the code. A presentation for coverage data is generated, wherein the set data access indicators are identified in the presentation. | 2008-12-25 |
20080320449 | DETECTING MEMORY LEAKS - Methods of detecting a memory leak may include identifying a largest ChildNode of a ParentNode, and comparing a total size of the ParentNode to a total size of the largest ChildNode of the ParentNode. If the total size of the ParentNode is significantly larger than the total size of the largest ChildNode of the ParentNode, a possible memory leak area may be identified. Related systems and computer program products are also discussed. | 2008-12-25 |
20080320450 | RECOVERABLE RETURN CODE TRACKING AND NOTIFICATION FOR AUTONOMIC SYSTEMS - A system, method and article of manufacture return code management in autonomic systems and more particularly to managing execution of operations in data processing systems on the basis of return code tracking. One embodiment provides a method for managing execution of an operation in a data processing system. The method comprises tracking return codes received from previous executions of the operation in the data processing system, determining an execution behavior of the operation from the tracked return codes, and managing a subsequent execution of the operation on the basis of the determined execution behavior. | 2008-12-25 |
20080320451 | Procedure Summaries for Pointer Analysis - Pointer analysis is used for different applications, e.g., compilers, debugging tools and programs understanding tools, each having different requirements. A framework for pointer analysis is provided that defines a multidimensional space, for example a three-dimensional space, containing an order sensitivity dimension, a predicate sensitivity dimension and a value persistence dimension. A point in the three-dimensional space is identified. This point yields values for order sensitivity, predicate sensitivity and value persistence. Pointer analysis is then conducted on a computer program in accordance with the identified values for order sensitivity, predicate sensitivity and value persistence. | 2008-12-25 |
20080320452 | Software diversity using context-free grammar transformations - A method may include mapping a first program to a context-free grammar. Grammar transformations may be performed on the context-free grammar to produce a transformed context-free grammar representing the first program. A second program having a program structure different than a program structure of the first program may be constructed from the transformed context-free grammar. | 2008-12-25 |
20080320453 | TYPE INFERENCE AND LATE BINDING - A type inference option is available for a computer programming language. The option acts as a switch to specify whether or not type inference is applicable (e.g., on or off). Type inference can be employed in conjunction with late binding or options therefor. In this manner, a computer program can be developed with the convenience of type inference and the flexibility of late binding while still maintaining at a degree of type safety. | 2008-12-25 |
20080320454 | Variable address length compiler and processor improved in address management - The present invention discloses a program converting unit for generating a machine language instruction from a source program for a processor that manages an N-bit address while processing M-bit data, N being greater than M, and such a processor that runs the converted program. The program converting unit comprising: a parameter holding unit for holding a data width and a pointer width designated by a user; the data width representing the number of bits of data used in the source program while the pointer width representing the number of bits of an address; and a generating unit for generating an instruction to manage the data width when a variable operated by the instruction represents the data, and for generating an instruction to manage the pointer width when a variable operated by the instruction represents the address. | 2008-12-25 |
20080320455 | PEDIGREE ANALYSIS FOR SOFTWARE COMPLIANCE MANAGEMENT - Embodiments of the present invention address deficiencies of the art in respect to source code analysis and provide a novel and non-obvious method, system and computer program product for source code pedigree management. In one embodiment of the invention, a method for source code pedigree management can be provided. The method can include parsing source code to identify copyright rights holders for corresponding copyright constructs, rejecting copyright constructs not associated with corresponding rights holders, compiling a list of the identified copyright rights holders, corresponding copyright statements, and lists of files corresponding to each of the copyright rights holders, and displaying the compiled list. | 2008-12-25 |
20080320456 | Targeted patching - Various technologies and techniques are disclosed that provides targeted patching for native generation images. Changed binaries are updated with information that indicates whether or not they contain safe changes. A servicing process can then be provided for a client machine. For any compatible binaries with changes that have been identified as safe, a native generation update is performed that includes recompilation of the compatible binaries with the safe changes, and an updating of binding information for any dependent binaries. For any non-compatible binaries with changes that have been identified as unsafe, a native generation update is performed that includes recompilation of any non-compatible binaries and any dependent binaries. | 2008-12-25 |
20080320457 | Intermediate Code Metrics - Metrics may be determined from intermediate computer code by reading and analyzing an entire application using intermediate code, including any linked portions. The metrics may include cyclomatic complexity, estimated or actual number of lines of code, depth of inheritance, type coupling, and other metrics. The metrics may be combined into a quantifiable metric for the code. | 2008-12-25 |
20080320458 | Using Memory Usage to Pinpoint Sub-Optimal Code for Gaming Systems - Systems and methods for using memory usage to pinpoint sub-optimal code for gaming systems are provided herein. Memory usage characteristics, such as latency, cache misses, load-hit-store, memory address misuse, and wasted cache bandwidth are presented, preferably in a graphical format, to provide the developer with information for optimizing source code. A trace analysis is performed on source code undergoing optimization. Relevant data is extracted from the trace analysis, sorted as necessary, and presented to the user. The user may be presented with multiple results sorting mechanisms as well as ways to change the presentation of the results. | 2008-12-25 |
20080320459 | Method And Systems For Providing Concurrency Control For Addressable Entities - Methods and systems are described for providing concurrency control for addressable entities. In one embodiment, a concurrency policy is associated with an addressable entity in an executable program component generated from source code, the concurrency policy controlling an order of access by a plurality of runtime processes each executing machine code instructions for accessing the addressable entity, the machine code instructions generated from source code, wherein the concurrency policy is associated with the addressable entity independent of the source code of the executable program component and the source code of the machine code instructions. An attempt to access the addressable entity by a machine code instruction executed by a runtime process of the plurality of runtime processes is detected. The machine code instruction is allowed to access the addressable entity based on the concurrency policy. | 2008-12-25 |
20080320460 | Fulfillment of requirement for versioned resource - A requirement for a versioned resource is fulfilled, particularly in light of compatibility constraints of the requirement. Versions of the versioned resource are associated with compatibility information, such as a feature version and a service version, for example. In fulfilling the requirement, compatibility logic may be applied to identify versions that are compatible with the requirement, and selection logic may be applied to select a preferred version from the compatible versions. | 2008-12-25 |
20080320461 | Method and Apparatus for Reliable In-Place Update - Method and apparatus for in-place updating an old version of a file stored on a storage device to form a new version, wherein the old version includes blocks. The form of the old version is determined for indicating at which end of the old version free space is located, as well as determining whether an update package is a corresponding update package for the form. If the update package is a corresponding update package, blocks in the old version are updated according to the update package, giving rise to a new version having an alternative form, where free space in the new version is at an opposite end to the old version. | 2008-12-25 |
20080320462 | SEMI-AUTOMATED UPDATE OF APPLICATION TEST SCRIPTS - An apparatus and method for maintaining a collection of test scripts. At least one test script module is identified that is common to at least two unmodularized test scripts that are each associated with a common application. The at least two unmodularized test scripts are divided into modularized test scripts that each comprise the at least one test script module. An update to the common application is received and at least one of the at least one test script modules is updated in response to the update of the common application. The updating of each of the at least one of the at least one test script module causes a corresponding update to the at least two unmodularized test scripts. | 2008-12-25 |
20080320463 | System, method and computer-readable medium for enhanced user deletion of software from a computer - A system, method and computer-readable medium are provided for deleting software from a computational device, such as a personal computer, a cell phone or a personal digital assistant. The invented method includes (a.) providing a visual representation of application icons associated with a demo center icon, each icon having a one-to-one correspondence with at least one software application; (b.) enabling a user to select an icon; and (c.) directing the at least one computational device to delete the software application associated with the selected icon from the computational device. The software application may be provided in an operational state of (1.) being incomplete and requiring additional software encoded instructions to be read into the computer in order to at least partially function; (2.) being complete and enabled to operate only within a trial period; or (3.) being complete and requiring a purchase for operation or use. | 2008-12-25 |
20080320464 | Radio Base Station and a Method of Operating a Radio Base Station - The present invention relates to the operation and maintenance of radio base stations in mobile communication systems. An inventive radio base station, which can be upgraded remotely in a safe way. In one embodiment of the invention, the radio base station comprises a file system comprising different versions of files, so that an old version of a file can be reverted to should problems in the operation of the radio base station occur In another embodiment of the invention, the radio base station comprises a back-up area in which a copy of the files of the file system are stored. The back-up area is independent of the file system, so that if problems with the files in the file system are detected, the contents of the back-up area can be stored in the file system. | 2008-12-25 |
20080320465 | METHODS AND SYSTEMS FOR PORTING SOFTWARE PACKAGES FROM ONE FORMAT TO ANOTHER - The present invention allows Red Hat Package Manager (RPM) systems to work with non-RPM packages. In particular, the present invention provides for installing an RPM subsystem on a system that has its own native packaging subsystem. The RPM subsystem is initially delivered as a package wrapped in the non-RPM format of the native packaging system and installed. An administrator may then install RPM packages using the RPM tools of the RPM subsystem. When an RPM package is installed, the RPM subsystem is also configured to create a stub entry in the native packaging, non-RPM system. The stub entry may contain the normal package information, such as name, version, description, as well as a list of files contained in a package. The stub may also contain uninstallation logic, which serves as a “callback” into the RPM subsystem during package removal and causes the RPM subsystem to remove the package when invoked. Removal of a RPM package via RPM tools also causes the removal of the stub entry. Accordingly, both the RPM subsystem and native packaging, non-RPM subsystem may have consistent states. | 2008-12-25 |
20080320466 | AUTOMATIC SOFTWARE INSTALLATION AND CLEANUP - An application installation and removal system and method comprising: an operating system for controlling and maintaining resources on a computer; and an event monitor configured detect availability of an new software to be installed on the client; receive a list of new software on the client; perform installation of the software on the client wherein performing installation comprises creating a record of all user defined applications on the client immediately prior to performing the installation in a log file; installing the new software on the client; rebooting the client after the installation of the new software on the client; resorting all the user defined applications recorded in the log file to the same state as the user defined applications were prior to the installation of the new software. | 2008-12-25 |
20080320467 | Generically Managing the Configuration of Heterogeneous Software Artifacts - A method for managing a configuration of heterogeneous software artifacts uses a common central configuration representation. An artifact of an unknown type, from an initial software solution, is submitted to a solution configuration tool. The solution configuration tool sends a request to a solution architect for locations of configuration files within the artifact. For each artifact whose configuration file locations have been requested from the solution architect, the solution configuration tool determines if each corresponding configuration file is a property file or an Extensible Markup Language (XML) file. If the corresponding configuration file is an XML file, then the solution architect provides a first and second xPath for locating the names and values of the configuration parameters in the XML configuration file. The configuration file and configuration parameter locator information is then stored in a configuration locator file. Information in the configuration locator file is used to introspect configuration parameters from the artifacts and store these generically in a central configuration file. Solution-level parameters are then defined and mapped to artifact-level parameters for use in configuring subsequent software solutions instantiated from the initial software solution. | 2008-12-25 |
20080320468 | Standardized Software Application Configuration - A system and method of providing a user with a post installation configuration file include providing a user with a list of software applications that are available for installation. At least one software application selection from the list of applications is received by the system. At least one post installation configuration script associated with the use selected software application is retrieved, the at least one post installation configuration script using a common user interface for a plurality of software application from the list of software applications. The at least one post installation configuration script associated with the use selected software application and the at least one user selected software application are packaged into a user package. | 2008-12-25 |
20080320469 | METHOD OF RECEIVING/TRANSMITTING EVENT MESSAGE, CONTROLLED DEVICE, AND CONTROL POINT - A selective event message receiving method is provided, in which an application is installed in a controlled device (CD) by using a network, a start message which includes a parameter specifying at least one service included in the application and requests a start of the application is transmitted to the CD, and an event message that represents a state change of the at least one service specified by the parameter is received from the CD. Accordingly, the application can be efficiently managed by selectively recognizing state changes of some services of interest from among the services included in the application. | 2008-12-25 |
20080320470 | Process for creating an automatically distributable software package - The invention relates to a process for creating an automatically distributable software package, as based on a standard software that is supplied to the computer. The process calls for a server that is connected to the computer over a communication network, such as the Internet, and involves the following steps:
| 2008-12-25 |
20080320471 | System-Program Download System - To provide a system-program download system that cannot provide a program for control devices to devices and to persons other than a registered control device and a registered user. The system-program download system includes: a management server that manages information on a customer who has purchased a control device and information on the control device, determines whether a customer and a control device are legitimate upon reception of a request for downloading a program from the customer, and generates a download module including a program and a machine-information verification code that identifies the control device; a portable storage medium | 2008-12-25 |
20080320472 | METHODS AND SYSTEMS FOR DYNAMICALLY GENERATING INSTALLATION CONFIGURATION FILES FOR SOFTWARE - The present invention provides methods and systems for dynamically generating configuration files used in installing software distributions and software installation testing. In particular, the present invention employs a framework comprising an API to discover and monitor an inventory of distributions, a set of templates for the configuration files, and plugins that may be selectively invoked to customize the configuration files. When performing installation testing, a server will access the distribution inventory and select appropriate templates that are to be part of the test. The server will then automatically generate the installation configuration files from the templates. The server may also execute one or more plugins that customize the configuration files as desired. Small client applications run on the target machines of the installation tests and are used to download the configuration files and the distributions. The present invention may also employ a scheduling service to coordinate the operations of the server and target machines. | 2008-12-25 |
20080320473 | METHODS AND SYSTEMS FOR DYNAMICALLY GENERATING INSTALLATION CONFIGURATION FILES FOR SOFTWARE - The present invention provides methods and systems for dynamically generating configuration files used in installing software distributions and software installation testing. In particular, the present invention employs a framework comprising an API to discover and monitor an inventory of distributions, a set of templates for the configuration files, and plugins that may be selectively invoked to customize the configuration files. When performing installation testing, a server will access the distribution inventory and select appropriate templates that are to be part of the test. The server will then automatically generate the installation configuration files from the templates. The server may also execute one or more plugins that customize the configuration files as desired. Small client applications run on the target machines of the installation tests and are used to download the configuration files and the distributions. The present invention may also employ a scheduling service to coordinate the operations of the server and target machines. | 2008-12-25 |
20080320474 | DYNAMIC, TEMPORARY RESOURCE POOLS FOR USE IN VIRTUALIZATION - A method of implementing virtualization involves dynamic, temporary resource pools. A virtualizing subsystem is capable of partitioning a plurality of physical resources to create resource pools. The virtualizing subsystem is further capable of creating separate environments that logically isolate applications from each other, and assigning a created separate environment to a created resource pool. A separate environment is configured by defining properties of the separate environment. Configuring the separate environment includes specifying at least one resource pool attribute. When the separate environment is started, a temporary resource pool is created from available physical resources and the separate environment is assigned to the temporary resource pool. The temporary resource pool is created in accordance with the at least one resource pool attribute specified when the separate environment was configured. The temporary resource pool may be destroyed when the separate environment is shutdown. | 2008-12-25 |
20080320475 | Switching user mode thread context - Various technologies and techniques are disclosed for switching user mode thread context. A user mode portion of a thread can be switched without entering a kernel by using execution context directly based on registers. Upon receiving a request to switch a user mode part of a thread to a new thread, user mode register contexts are switched, as well as a user mode thread block by changing an appropriate register to point at the user mode thread block of the new thread. Switching is available in environments using segment registers with offsets. Each user mode thread block in a process has a descriptor in a local descriptor table. When switching a user mode thread context to a new thread, a descriptor is located for a user mode thread block of the new thread. A shadow register is updated with a descriptor base address of the new thread. | 2008-12-25 |
20080320476 | VARIOUS METHODS AND APPARATUS TO SUPPORT OUTSTANDING REQUESTS TO MULTIPLE TARGETS WHILE MAINTAINING TRANSACTION ORDERING - A method, apparatus, and system are described, which generally relate to an integrated circuit having an interconnect that implements internal controls. The interconnect in an integrated circuit communicates transactions between initiator Intellectual Property (IP) cores and target IP cores coupled to the interconnect. The interconnect implements logic configured to support multiple transactions issued from a first initiator IP core to the multiple target IP cores while maintaining an expected execution order within the transactions. The logic supports a second transaction to be issued from the first initiator IP core to a second target IP core before a first transaction issued from the same first initiator IP core to a first target IP core has completed while ensuring that the first transaction completes before the second transaction and while ensuring an expected execution order within the first transaction and second transaction are maintained. The logic does not include any reorder buffering. | 2008-12-25 |
20080320477 | METHOD FOR SCHEDULING AND CUSTOMIZING SURVEILLANCE TASKS WITH WEB-BASED USER INTERFACE - A customized surveillance task management system is implemented to intelligently schedule tasks for the user. Via an internet connection a user accesses a list of surveillances to be accomplished. The schedule of surveillances is created from information initially loaded into a centralized database that is subsequently analyzed by the schedule engine and written back into the database. Following execution of these surveillances the user again accesses the system to input data acquired. The user then inputs data to the database via the internet interface via preset database fields rendered to the client machine. This data is again analyzed by the scheduling engine and, with the help the scheduling, criticality, random sampling, and surveillance method assistants, provides the user with an updated schedule list and best set of surveillance methods dependent upon pass/fail rates and criticality of failures. | 2008-12-25 |
20080320478 | AGE MATRIX FOR QUEUE DISPATCH ORDER - An apparatus for queue allocation. An embodiment of the apparatus includes a dispatch order data structure, a bit vector, and a queue controller. The dispatch order data structure corresponds to a queue. The dispatch order data structure stores a plurality of dispatch indicators associated with a plurality of pairs of entries of the queue to indicate a write order of the entries in the queue. The bit vector stores a plurality of mask values corresponding to the dispatch indicators of the dispatch order data structure. The queue controller interfaces with the queue and the dispatch order data structure. The queue controller excludes at least some of the entries from a queue operation based on the mask values of the bit vector. | 2008-12-25 |
20080320479 | TELECOM ADAPTER LAYER SYSTEM, AND METHOD AND APPARATUS FOR ACQUIRING NETWORK ELEMENT INFORMATION - A Telecom Adapter Layer (TAL) system includes a management unit and an execution unit connected via a distributed bus. In order to acquire network element (NE) information, an external service module sends a Get Info request to the execution unit according to the reference of the execution unit, and the execution unit acquires information from an NE according to the request and returns the NE information acquired from the NE to the external service module. The execution unit can be deployed in a device other than the service module or the management unit. The TAL system may be expanded to include more than one management unit and/or execution unit. By acquiring NE information from the execution unit, the TAL system is capable to perform NE management across a firewall. | 2008-12-25 |
20080320480 | SYSTEM FOR DETERMINING ARRAY SEQUENCE OF A PLURALITY OF PROCESSING OPERATIONS - A method and system for determining an array sequence of processing operations to maximize the efficiency of steel plate processing. Between two processing operations, a first sequence constraint based on a first attribute of each processing operation and a second sequence constraint based on a second attribute of each processing operation are defined. A system selects, as a cluster, at least one of processing operations having a common attribute value of the first attribute, and arranged in a sequence satisfying the second sequence constraint. The system regards the first sequence constraint as a sequence constraint between a plurality of clusters, and arranges the plurality of clusters in a sequence maximizing the efficiency of processing. | 2008-12-25 |
20080320481 | Method and Apparatus for Playing Dynamic Content - A method for playing dynamic content includes: allocating and occupying playing resources for playing of dynamic contents by dynamic content priority; preempting playing resources occupied by dynamic contents of lower priorities to play back dynamic contents of higher priorities in precedence. The dynamic contents of which the playing resources are preempted can be handled as appropriate in accordance with the preset processing policy. A playing apparatus for playing dynamic content includes a content receiving module, a storage unit, a play scheduling module, a content playing module, and a user configuration module. The present invention supports automatic playing of dynamic contents by priority and in accordance with the policy preset by the user, and can be implemented simply and conveniently. | 2008-12-25 |
20080320482 | MANAGEMENT OF GRID COMPUTING RESOURCES BASED ON SERVICE LEVEL REQUIREMENTS - Generally speaking, systems, methods and media for management of grid computing resources based on service level requirements are disclosed. Embodiments of a method for scheduling a task on a grid computing system may include updating a job model by determining currently requested tasks and projecting future task submissions and updating a resource model by determining currently available resources and projecting future resource availability. The method may also include updating a financial model based on the job model, resource model, and one or more service level requirements of an SLA associated with the task, where the financial model includes an indication of costs of a task based on the service level requirements. The method may also include scheduling performance of the task based on the updated financial model and determining whether the scheduled performance satisfies the service level requirements of the task and, if not, performing a remedial action. | 2008-12-25 |
20080320483 | RESOURCE MANAGEMENT SYSTEM AND METHOD - Resource management system is provided, implemented between a service bundle developer and provider and a service bundle user. A resource requirement determining device determines a system resource requirement for a service bundle provided by the service bundle developer and provider, and generates resource requirement information corresponding to the service bundle. A processor receives information of system resource utilization status from the service bundle user, determines whether available resource of the service bundle user is sufficient for the resource requirement of the service bundle, when the available resource of the service bundle user is insufficient, the processor generates a waiting queue, and adds the service bundle into the waiting queue. When available resource of the service bundle user is sufficient, the processor installs the service bundle specified in the waiting queue in the service user. A storage device stores the waiting queue and corresponding resource requirement information. | 2008-12-25 |
20080320484 | METHOD AND SYSTEM FOR BALANCING THE LOAD AND COMPUTER RESOURCES AMONG COMPUTERS - A method and system for balancing the load of computer resources among a plurality of computers having consumers consuming the resources is disclosed. After defining the lower threshold of the consumption level of the resources and obtaining the consumption level of the resources for each of the consumers and for each of said computers, the consumption level for each of the computers is compared during a period with its associated lower threshold. Whenever a computer having a consumption level of the resources higher than the lower threshold is identified, a new layout of computer resources for each of the consumers is determined. Consumers are then shifted from their current location in the computer to a corresponding location in another computer according to the layout, so that the consumption level of the resource(s) for a computer may be reduced. | 2008-12-25 |
20080320485 | Logic for Synchronizing Multiple Tasks at Multiple Locations in an Instruction Stream - Logic (also called “synchronizing logic”) in a co-processor (that provides an interface to memory) receives a signal (called a “declaration”) from each of a number of tasks, based on an initial determination of one or more paths (also called “code paths”) in an instruction stream (e.g. originating from a high-level software program or from low-level microcode) that a task is likely to follow. Once a task (also called “disabled” task) declares its lack of a future need to access a shared data, the synchronizing logic allows that shared data to be accessed by other tasks (also called “needy” tasks) that have indicated their need to access the same. Moreover, the synchronizing logic also allows the shared data to be accessed by the other needy tasks on completion of access of the shared data by a current task (assuming the current task was also a needy task). | 2008-12-25 |
20080320486 | Business Process Automation - A system for business processes within and between organizations and/or individuals may be automated using standards-based, service-oriented business process automation architectures based on XML and Web Services Standards is described. An execution framework for the business processes is also described. Further aspects include a decomposition methodology for deconstructing business process specifications into business flows, business rules and business states. The business flows (FIG. | 2008-12-25 |
20080320487 | SCHEDULING TASKS ACROSS MULTIPLE PROCESSOR UNITS OF DIFFERING CAPACITY - A mechanism is provided for scheduling tasks across multiple processor units of differing capacity. In a multiple processor unit system with processor units of disparate speeds, it is advantageous to have the most processing-intensive tasks run on the processor units with the highest capacity. All tasks are initially scheduled on the lowest capacity processor units. Because processor units with higher capacity are more likely to have idle time, these higher capacity processor units may pull one or more tasks onto themselves from the same or lower capacity processor units. A processor unit will attempt to pull tasks that utilize a larger percentage of the timeslice. When a higher capacity processor unit is overloaded or near capacity, the higher capacity processor unit may push tasks to processor units with the same or lower capacity. A processor unit will attempt to push tasks that utilize a smaller percentage of the timeslice. | 2008-12-25 |
20080320488 | CONTROL DEVICE AND CONTROL METHOD FOR REDUCED POWER CONSUMPTION IN NETWORK DEVICE - This invention provides a data transfer control device for carrying out data transfer using a plurality of transfer resources. The data transfer control device comprises a transfer resource management portion that set the plurality of transfer resources to either one of a transfer-enabled state whereby data transfer is enabled and a plurality of standby states on the basis of a load on the data transfer control device and that manages the plurality of transfer resources so as to assume the set operating status; and a load distribution portion that distributes the data to transfer resources that have been set to the transfer-enabled state. The plurality of standby states are states which data transfer is disabled and which mutually differ at a minimum in terms of at least one of power consumption level and transition time to the transfer-enabled state. | 2008-12-25 |
20080320489 | LOAD BALANCING - In a preferred embodiment, the present invention provides a method of load balancing in a data processing system comprising a plurality of physical CPUs and a plurality of virtual CPUs, the method comprising: mapping one or more virtual CPUs to each of said physical OPUs; and dynamically adapting the mapping depending on the load of said physical CPUs. | 2008-12-25 |
20080320490 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING SUB-PROCESS RESOURCE MANAGEMENT - An apparatus for providing sub-process resource management includes a processing element. The processing element may be configured to communicate with a process being executed by an operating system, to receive information regarding a resource associated with an isolated sub-process within the process, to establish an association between the resource and the isolated sub-process, and to perform sub-process resource management based on the received information. | 2008-12-25 |
20080320491 | METHOD OF RECEIVING/TRANSMITTING EVENT MESSAGE, CONTROLLED DEVICE, AND CONTROLLED POINT - An event message transmitting method performed in a controlled device (CD) which is controlled by a control point (CP) is provided, in which an application is received from the CP via a network according to a network protocol, the received application is installed according to a framework of an execution environment of the CD, a first event message that represents a state change of the application is generated according to the framework, and the first event message is converted into a second event message that conforms to the predetermined network protocol. Accordingly, information about a state change of a CD which operates in an execution environment can be adaptively transmitted according to a network protocol. | 2008-12-25 |
20080320492 | APPARATUS AND METHODS USING INTELLIGENT WAKE MECHANISMS - An embodiment of the present invention provides a network interface card (NIC), comprising an intelligent wake mechanism and a device driver associated with the intelligent wake mechanism and configured to agree with embedded software on a set of wake codes and wake behaviors associated with the wake codes such that when the NIC encounters a wake event, the NIC first adds the wake code to a command queue, then it drives a PME pin to high to wake a device connected to the NIC. | 2008-12-25 |
20080320493 | SYSTEM AND METHOD FOR USING A MOBILE AGENT OBJECT TO COLLECT DATA - Method and system for collecting and filtering messages received at an event source platform and delivering the filtered messages to a collection host platform. According to one embodiment, the system uses a mobile agent object to filter messages received at an event source platform. The mobile agent object determines a filtered set of messages that match predetermined parameters and then delivers the filtered messages to a collection host platform for storage or redirection. | 2008-12-25 |
20080320494 | DATA PROCESSING METHOD, DATA PROCESSING APPARATUS, AND DATA PROCESSING PROGRAM - In reference, update, and insertion processing, the lock of an un-transferred object is released, and then the lock of a transferred object is set when the pointer is traced for transfer between objects to thereby improve the parallel execution capability of the reference, update, and insertion. At that time, the IS-mode (in the case of reference processing) or the IX-mode (in the case of update and insertion processing) is set at the starting of the processing, and the lock is released at the time of completion of the processing. Furthermore, in deletion processing, after the pointer to a deletion target is separated or replaced and all the processing that acquires the lock of an object group has been completed, the region of the deletion target object is released. | 2008-12-25 |
20080320495 | SYSTEM AND METHOD FOR DETECTING PATTERN OF EVENTS OCCURRED IN INFORMATION SYSTEM - There is provided a system having a plurality of information processing apparatuses, each of which includes a storage device where at least one piece of pattern data indicating an occurrence pattern of events to be detected in the information processing apparatus is stored, a generation section that specifies a collection of events to be detected in the occurrence pattern based on the pattern data read from the storage device and generates necessary event data indicating the specified collection of events, a selection section that selects an event included in the necessary event data from events which have occurred in the information processing apparatus and events transferred from another information processing apparatus, and a detection section that detects if the selected event matches with the occurrence pattern indicated by the pattern data, and outputs a detection result. | 2008-12-25 |
20080320496 | Method for Improving Temporal Consistency and Snapshot Recency in a Monitored Real-Time Software-Reporting-Application Architecture - An object-oriented software application is provided for receiving updates that change state of an object model and reporting those updates to requesting users. The application includes a database application for storing data; an object model driver for writing updates into the database; a notification system for notifying about the updates; and, a plurality of external monitors for reading the updates. In a preferred embodiment the object model produces multiple temporal snapshots of itself in co-currency with received events, each snapshot containing associated update information from an associated event and whereupon at the time of occurrence of each snapshot coinciding with an event the notification system notifies the appropriate external monitor or monitors, which in turn access the appropriate snapshot, performs calculations thereupon if required and renders the information accessible to the users. | 2008-12-25 |
20080320497 | SERVICE MOBILITY FOR COMPOSED COMPONENTS - A system and method for exchanging components between platforms is described. As a user terminal changes location or preferences, the user terminal may be provided with a new platform that supports desired services. A method and system that relates to migrating one or more components that provide composite services from one communication platform to another is described. A user terminal may receive one or more composite services provided by two or more components existing on platform. As the user terminal switches from one platform to another, the platforms attempt to provide the same services to the user with little to no interruption. Various aspects relate to shifting one or more components from the first platform to the second platform to provide local support for the services desired by the user terminal. | 2008-12-25 |
20080320498 | High Performance Script Behavior Detection Through Browser Shimming - The behavior of browser applications, such as web browsers, can be controlled in part by script-based instructions present within documents read by those browsers. To analyze such scripts in an efficient manner, a script analyzer can identify the scripts in the document, divide them into script modules, and order the modules to represent an interpretational flow. The script can be interpreted and executed on a line-by-line basis and its behavior analyzed. Prior to interpretation, the scripts can be reviewed for delay conditionals, and such statements can be modified for more efficient interpretation. Additionally, if, during interpretation, the script generates new script, or modifies existing script, such new scripts can be themselves interpreted. External function calls made by the script can be intercepted and responded to in a generic fashion, limiting the need to create a document object model, based on the document's data, solely for script analysis purposes. | 2008-12-25 |