52nd week of 2012 patent applcation highlights part 69 |
Patent application number | Title | Published |
20120331426 | CELL ARCHITECTURE AND METHOD - A method includes selecting a cell stored in a non-transient computer readable storage medium, arranging a plurality of the cells on a model of a semiconductor device, and creating a mask for the semiconductor device based on the model of the semiconductor device. The cell is designed according to a design rule in which a first power-supply-connection via satisfies a criterion from the group consisting of: i) the first power-supply-connection via is spaced apart from a second power-supply-connection via by a distance that is greater than a threshold distance such that the cell can be fabricated by a single-photolithography single-etch process, or ii) the first power-supply-connection via is coupled to first and second substantially parallel conductive lines that extend along directly adjacent tracks. | 2012-12-27 |
20120331427 | IN-SITU SCANNER EXPOSURE MONITOR - A method for predicting pattern critical dimensions in a lithographic exposure process includes defining relationships between critical dimension, defocus, and dose. The method also includes performing at least one exposure run in creating a pattern on a wafer. The method also includes creating a dose map. The method also includes creating a defocus map. The method also includes predicting pattern critical dimensions based on the relationships, the dose map, and the defocus map. | 2012-12-27 |
20120331428 | METHOD FOR DESIGNING OPTICAL LITHOGRAPHY MASKS FOR DIRECTED SELF-ASSEMBLY - A method and a computer system for designing an optical photomask for forming a prepattern opening in a photoresist layer on a substrate wherein the photoresist layer and the prepattern opening are coated with a self-assembly material that undergoes directed self-assembly to form a directed self-assembly pattern. The methods includes: generating a mask design shape from a target design shape; generating a sub-resolution assist feature design shape based on the mask design shape; using a computer to generate a prepattern shape based on the sub-resolution assist feature design shape; and using a computer to evaluate if a directed self-assembly pattern of the self-assembly material based on the prepattern shape is within specified ranges of dimensional and positional targets of the target design shape on the substrate. | 2012-12-27 |
20120331429 | CIRCUIT MANUFACTURING AND DESIGN TECHNIQUES FOR REFERENCE PLANE VOIDS WITH STRIP SEGMENT - Manufacturing circuits with reference plane voids over vias with a strip segment interconnect permits routing critical signal paths over vias, while increasing via insertion capacitance only slightly. The transmission line reference plane defines voids above (or below) signal-bearing plated-through holes (PTHs) that pass through a rigid substrate core, so that the signals are not degraded by an impedance mismatch that would otherwise be caused by shunt capacitance from the top (or bottom) of the signal-bearing PTHs to the transmission line reference plane. In order to provide increased routing density, signal paths are routed over the voids, but disruption of the signal paths by the voids is prevented by including a conductive strip through the voids that reduces the coupling to the signal-bearing PTHs and maintains the impedance of the signal path conductor. | 2012-12-27 |
20120331430 | CIRCUIT MANUFACTURING AND DESIGN TECHNIQUES FOR REFERENCE PLANE VOIDS WITH STRIP SEGMENT - Manufacturing circuits with reference plane voids over vias with a strip segment interconnect permits routing critical signal paths over vias, while increasing via insertion capacitance only slightly. The transmission line reference plane defines voids above (or below) signal-bearing plated-through holes (PTHs) that pass through a rigid substrate core, so that the signals are not degraded by an impedance mismatch that would otherwise be caused by shunt capacitance from the top (or bottom) of the signal-bearing PTHs to the transmission line reference plane. In order to provide increased routing density, signal paths are routed over the voids, but disruption of the signal paths by the voids is prevented by including a conductive strip through the voids that reduces the coupling to the signal-bearing PTHs and maintains the impedance of the signal path conductor. | 2012-12-27 |
20120331431 | Symbolic Switch/Linear Circuit Simulator Systems and Methods - Interactive and real time web-based electrical circuit symbolic solvers and simulators. The invention includes an interactive and innovative graphical user interface (GUI) for creating circuit schematics and generating netlists, circuits symbolic solving and instant simulated solutions, their systems and methods. Users such as students can use GUI interfaces to remotely access a remote server controlled by educational institutions such as universities, or electronic book publishers, in order to draw, symbolically solve, and instantly simulate electrical circuits. | 2012-12-27 |
20120331432 | IMPLEMENTING DUAL SPEED LEVEL SHIFTER WITH AUTOMATIC MODE CONTROL - A method and circuit for implementing a dual speed level shifter with automatic mode control, and a design structure on which the subject circuit resides are provided. A low speed level shifter and a high speed level shifter are used to provide a wide frequency range of operation. The circuit operates in one of a low speed mode or a high speed mode. The appropriate mode is selected automatically by detecting the frequency of the signal to be level shifted. When the incoming signal is slower than a reference frequency, the low speed level shifter is selected, and when the incoming signal is faster than the reference frequency, the high speed level shifter is selected. | 2012-12-27 |
20120331433 | INTEGRATED CIRCUIT STACK - The invention relates to an integrated circuit stack ( | 2012-12-27 |
20120331434 | COMPUTING DEVICE AND METHOD FOR CHECKING SIGNAL TRANSMISSION LINES - A computing device and a method reads design standards of signal transmission lines in a printed circuit board (PCB) layout file, and determines a minimum reference length of line segments of the signal transmission lines from the design standards. The device and method then selects a signal transmission line from a circuit board, and computes an actual length of each line segment of the selected signal transmission line. If each actual length is more than or equal to the minimum reference length, the device and method determines length design of the selected signal transmission line satisfies the design standards. Otherwise, if any actual length is less than the minimum reference length, the device and method determines the length design of the signal transmission line does not satisfy the design standards. | 2012-12-27 |
20120331435 | INTEGRATED CIRCUIT DESIGN USING THROUGH SILICON VIAS - A method of integrated circuit design using through silicon vias (TSVs) can include determining that a stress field to which a first active circuit element of a circuit block is exposed and a stress field to which a second active circuit element of the circuit block is exposed are mismatched. Mismatch between the stress field of the first active circuit element and the stress field of the second active circuit element can be reduced by modifying a layout of the die for a TSV. | 2012-12-27 |
20120331436 | VARIABLE Z0 ANTENNA DEVICE DESIGN SYSTEM AND METHOD - A variable Z | 2012-12-27 |
20120331437 | ELECTRONIC DEVICE AND METHOD FOR CHECKING LAYOUT OF PRINTED CIRCUIT BOARD - In a method for checking layout of a printed circuit board (PCB) using an electronic device, a signal line is selected from a layout diagram of the PCB. The method searches for signal lines which have an acute angle when deviating from a straight line in the layout diagram of the PCB. The method further locates attribute data of the searched signal lines in the layout diagram of the PCB, and displays the attribute data of the searched signal lines on a display device of the electronic device. | 2012-12-27 |
20120331438 | MEDIA FILES INCLUDING PROGRAMMING CODE AND DESCRIPTION - The description relates to media files and more particularly to media files that include a program and a human-understandable description of the program. One example can receive executable code. This example can determine a functionality provided by the executable code. The example can also create a media file that stores the executable code and presents the functionality in a human-understandable form. | 2012-12-27 |
20120331439 | SOFTWARE DEVELOPMENT AUTOMATED ANALYTICS - The discussion relates to software development automated analytics. One example can access a database related to a software development project. The database can include both software code and non-code metadata. The example can analyze the non-code metadata and the software code to identify parameters. It can relate the parameters to aspects of the software development project. The example can cause a graphical user interface to be presented that conveys an individual aspect. | 2012-12-27 |
20120331440 | OPTIMIZED SOFTWARE DEVELOPMENT - Aspects of optimized software development are described herein. In an implementation, according to a method for optimized software development, specifications of a repetitive-use software asset are published on an open platform over a network to acquire a demand parameter associated with the repetitive-use software asset. The demand parameter is acquired based on the specifications of the repetitive-use software asset. Based on the demand parameter associated with the repetitive-use software asset, a use-commitment indicator is obtained. The use-commitment indicator indicates a commitment for using the repetitive-use software asset. Further, a recommendation for developing the software asset is generated based on the use-commitment indicator. | 2012-12-27 |
20120331441 | APPLICATION TESTING USING SANDBOXES - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining, by the session establishment node, that a session should be established for the developer; transmitting, to a sandbox server, an instruction to establish a sandbox for the session; transmitting to the sandbox server, an identification of an emulator associated with the session; and notifying the developer when the sandbox is available for use. Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, by the sandbox server, an instruction to establish a sandbox; establishing the sandbox on the sandbox server; and instantiating a device emulator on the sandbox. | 2012-12-27 |
20120331442 | MANAGING A WORK PRODUCT IN A SYSTEMS DEVELOPMENT LIFECYCLE - An approach is provided for managing a work product. A data model is stored. A functional requirement is traced to an implemented service by displaying a sequence of displays: (1) details of the functional requirement; (2) details of a process element related to the functional requirement by the data model; (3) details of a business service related to the process element by the data model; (4) details of an information technology (IT) service design related to the business service by the data model; (5) details of a service component of the business service, the service component related to the IT service design by the data model; and (6) a document supporting the implemented service. Each of the displays (2) through (6) is displayed in response to a receipt of a selection of a hyperlink included in the previous display in the sequence. | 2012-12-27 |
20120331443 | METHOD AND SYSTEM FOR IDENTIFYING GRAPHICAL MODEL SEMANTICS - A system and method for identifying graphical model semantics, one aspect, receive a graphical diagram, associate each of a plurality of elements with at least one predetermined meta-types, identify a plurality of types in the graphical diagram, and determine a category for each of elements in said graphical diagram. Containment identification rules identify one or more containment relationships in the graphical diagram. Multiplicity identification rules identify multiplicity relationships in the graphical diagram. Advanced semantic rules identify visual elements that represent attributes and refine relationships to identify unique behavior. | 2012-12-27 |
20120331444 | SYSTEM AND METHOD FOR SYNCHRONIZED WORKFLOW MANAGEMENT - A system may identify a workflow associated with a graphical model and execute the workflow in a number of stages. The system may display a number of components of the graphical model and identify which of the displayed components are associated with or affected by execution of a current one of the stages of the workflow. | 2012-12-27 |
20120331445 | Unchanged Object Management - Apparatus and program products are disclosed. Using a static analysis performed on code, the code is analyzed to determine a set of unchanged objects and modifying the code to exercise a singleton-pattern technique for one or more members of the set of unchanged objects. The modified code is output. Another technique includes accessing code from a client, and in response to any of the code being source code, compiling the source code into object code until all the code from the client comprises object code. Using a static analysis performed on the object code, the object code is analyzed to determine a set of unchanged objects and the object code is modified to exercise a singleton-pattern technique for one or more members of the set of unchanged objects. The modified object code is returned to the client. | 2012-12-27 |
20120331446 | USING RANGE VALIDATION IN ASSEMBLY LANGUAGE PROGRAMMING - Embodiments of the present invention provide a method, system and computer program product for USING range validation during assembly of an assembly language program. In an embodiment of the invention, a method for USING range validation during assembly of an assembly language program has been provided. The method can include parsing assembler language source code loaded for assembly in an assembler executing in memory of a computer. The method also can include identifying a USING statement in the source code establishing a base address as the content of a register. Finally, in response to additionally identifying a subsequent statement in the source code that modifies the content of the register, a warning of an invalid USING range can be generated. | 2012-12-27 |
20120331447 | ADAPTIVE CHANGE MANAGEMENT IN COMPUTER SYSTEM LANDSCAPES - An adaptive automatic change management for computer system landscapes is described herein. A predefined set of attributes are extracted or obtained for a computer system artifact, together with a number of values assigned to the set of attributes. A unique identification section is created and distributed among the computer systems in the landscape based on the set of attributes and the assigned values, where the unique identification section encompass computer system artifacts of a same kind. A modification of an artifact of the same kind is tracked at a computer system. The tracked modification is automatically applied in the computer system to one or more incoming computer system artifacts of the same kind. | 2012-12-27 |
20120331448 | COVERAGE MEASUREMENT APPARATUS AND METHOD AND MEDIUM - According to one embodiment, a coverage measurement apparatus includes a compiler unit, an execution environment unit, and a coverage calculation unit. The compiler unit produces a first object code from a program to be subjected to coverage measurement, and inserts an instruction to switch to a code rewriting process into the first object code, the code rewriting process being such that when the instruction is executed, the instruction is rewritten into a no-operation instruction. The execution environment unit executes the first object code, thereby producing a second object code. The coverage calculation unit calculates, based on the first and second object codes, the coverage of the program to be subjected to the coverage measurement. | 2012-12-27 |
20120331449 | DEVICE, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A DEBUGGER SCRIPT - A method for evaluating a debugger script, the method includes: (i) receiving a debugger script that includes a first debugger breakpoint that is associated with a certain program line number; and determining a validity of the first debugger breakpoint in response to a comparison between expected content associated with the first debugger breakpoint and between an actual content of at least a portion of a certain program line group that comprises a certain program line identified by the certain program line number. | 2012-12-27 |
20120331450 | SYSTEM AND METHOD FOR APPLYING A SEQUENCE OF OPERATIONS CODE TO PROGRAM CONFIGURABLE LOGIC CIRCUITRY - A method and system are provided for deriving a resultant software program from an originating software program that may include overlapping branch logic. The method may include deriving a plurality of software objects from a sequence of processor instructions; associating software objects in accordance with an original logic of the sequence of processor instructions; determining and resolving memory precedence conflicts within the associated plurality of software objects; de-overlapping the execution of the associated plurality of software objects by replacing all overlapping branch logic instructions of the associated series of software objects with equivalent and non-overlapping branch logic instructions; and/or applying the de-overlapped associated plurality of software objects in a programming operation by a parallel execution logic circuitry. The resultant software is more easily converted into programming reconfigurable logic than the originating software program, computers or processors, or by means of a computer or a communications network. | 2012-12-27 |
20120331451 | SYSTEM AND METHOD FOR COMPILING MACHINE-EXECUTABLE CODE GENERATED FROM A SEQUENTIALLY ORDERED PLURALITY OF PROCESSOR INSTRUCTIONS - A method and system are provided for deriving a resultant software program from an originating software program having overlapping branches, wherein the resultant software project has either no overlapping branches or fewer overlapping branches than the originating software program. A preferred embodiment of the invented method generates a resultant software program that has no overlapping branches. The resultant software is more easily converted into programming reconfigurable logic than the originating software program. Separate and individually applicable aspects of the invented method are used to eliminate all four possible states of two overlapping branches, i.e., forward branch overlapping forward branch, back branch overlapping back branch, and each of the two possible and distinguishable states of forward branch and back branch overlap. One or more elements of each aspect of the invention may be performed by one or more computers or processors, or by means of a computer or a communications network. | 2012-12-27 |
20120331452 | OPTIMIZING PROGRAM BY REUSING EXECUTION RESULT OF SUBCLASS TEST FUNCTION - A technique for optimizing a program by reusing an execution result of a subclass test function. It includes a reusability determining unit to determine reusability of code of a subclass test function based on whether access to a global memory includes only access for reading out type information specified in a function call, a profiling unit configured to store an execution result of code determined to be reusable and specified information in a storage device in association with actually accessed type information, a reuse processing unit configured to reuse, in response to detection of a function call for calling the code determined to be reusable, the execution result on condition that the pieces of specified information specified in the function calls match, and a monitoring unit configured to monitor the type information associated with the execution result and prohibit reuse of the execution result if the type information is changed. | 2012-12-27 |
20120331453 | VECTORIZATION OF PROGRAM CODE - A method for vectorization of a block of code is provided. The method comprises receiving a first block of code as input; and converting the first block of code into at least a second block of code and a third block of code. The first block of code accesses a first set of memory addresses that are potentially misaligned. The second block of code performs conditional leaping address incrementation to selectively access a first subset of the first set of memory addresses. The third block of code accesses a second subset of the first set of memory addresses starting from an aligned memory address, simultaneously accessing multiple memory addresses at a time. No memory address belongs to both the first subset and the second subset of memory addresses. | 2012-12-27 |
20120331454 | Image Delta-Based Upgrade Of Complex Stack In Software Appliance - An approach is provided in which a host system identifies a set of differences between a first version of a software product and a second version of the software product. The set of differences include different file system files, database differences, and configuration differences. The host system creates database utilities and configuration utilities that correspond to the database differences and configuration differences, respectively. In turn, the host system creates an executable upgrade image that includes the different file system files, the database utilities, and the configuration utilities. | 2012-12-27 |
20120331455 | DETERMINING BEST PRACTICES FOR APPLYING COMPUTER SOFTWARE PATCHES - In a method for making a recommendation for installing a software patch on a target computer, a computer identifies a first and a second set of computers from a group of computers. Each computer in the first set has hardware and software components, which are identical to each other or differ from each other by less than a predetermined measure. Each computer in the second set has hardware and software components, which are identical to each other or differ from each other by less than a predetermined measure. The computer selects one of the first and the second sets of computers such that the selected set of computers includes a higher number of computers with the software patch already installed. | 2012-12-27 |
20120331456 | Comparing system engram with product engram to determine compatibility of product with system - Information includes states that are each representable by a number and that each corresponds to a characteristic. Each characteristic is assigned an index integer of an index, and has potential states from which the state corresponding to the characteristic is specified within the information. An engram value for each characteristic is equal to the number representing the state corresponding to the characteristic multiplied by a state base value for the characteristic. The state base value for each characteristic is equal to a base value to the power of the index integer assigned to the characteristic. The base value is identical for all the characteristics. An engram is based on the engram values for the characteristics. Engrams can be generated and can be compared to one another, to, for instance, determine whether a product can be compatibly installed in relation to a target system. | 2012-12-27 |
20120331457 | METHOD FOR INSTALLING APPLICATION IN PORTABLE TERMINAL - A method for installing an application in a portable terminal includes acquiring a screen image of another portable terminal and acquiring information about at least one applications from the acquired screen image, displaying a list of the at least one applications whose information is acquired, and requesting and receiving an installation file of an application selected by a user from the displayed list, and installing the selected application by using the received installation file. | 2012-12-27 |
20120331458 | Comparing system engram with product engram to determine compatibility of product with system - A system engram encoding an existing configuration of a target system is received. The existing configuration includes one or more of hardware and software of the target system. The system engram is originally acquired by a first processing device and is received by a second processing device. The second processing device compares the system engram with a product engram encoding a required configuration of the target system for a product to be compatibly installed in relation to the target system. The required configuration includes one or more of required hardware and required software within the target system for the product to be compatibly installed in relation to the target system. The second processing device can output, as compatibility information of the product with the target system, results of comparison of the system engram with the product engram. | 2012-12-27 |
20120331459 | Electronic Control System for a Machine - A machine such as a domestic appliance is designed by providing a controller that has a generic PSoC as part of the controller board and includes interfaces specifically designed for cooperation with the input sensors and output controls. The machine is serviced by a method comprising providing a hand held unit which can communicate through the internet with a database providing software for the PSoC of the SPCB circuit board, providing on the SPCB an interface for local communication with the hand held unit and causing the hand held unit to communicate with the database of machines, stored on the internet, to download software onto the PSoC of the machine. | 2012-12-27 |
20120331460 | Centrally Controlled Proximity Based Software Installation - An illustrative embodiment of a computer-implemented process for a centrally controlled proximity based software installation receives a request to install a software package, sends a list of machines associated with the received request to a rules engine and generates a set of proximity groups using the list of machines. The computer-implemented process uploads the software package of the received request to a selected machine within a proximity group of the set of proximity groups, instructs the selected machine to install the software package and instructs the remaining machines associated with the proximity group of the selected machine to download the software package from the selected machine and to install the software package. Responsive to a determination that no more requests exist, the computer-implemented process reports to a central installer. | 2012-12-27 |
20120331461 | HOST ENABLED MANAGEMENT CHANNEL - A logical communication path is provided between a target virtual machine (VM) and a host or application communicating with the VM. The target VM runs on a hypervisor host that has a hypervisor and a proxy agent. The hypervisor manages execution of the VM. A mapping is maintained indicating which VMs execute on which hosts. When the host or application is to send a message or packet to the target VM, the mapping is consulted and the hypervisor host hosting the target VM is identified. The message or packet, which may identify the target VM, is transmitted to the hypervisor host. A proxy agent at the hypervisor host selects a communication channel between the hypervisor and the target VM. The hypervisor then passes the message or packet through the selected channel to the target VM. | 2012-12-27 |
20120331462 | SYSTEMS AND METHODS FOR DELETION OF UNTRACKED DATASTORE PATHS - In an embodiment, first and second lists of virtual machine datastore paths are obtained. The first list includes datastore paths on a datastore. The second list includes datastore paths that are associated with existing virtual machines. The first and second lists are compared and non-matching datastore paths are deleted from the datastore, thereby freeing up disk space on the datastore. | 2012-12-27 |
20120331463 | METHOD FOR PROVIDING AN ON-DEMAND SOFTWARE EXECUTION SERVICE - A method for providing an on-demand software execution service comprising the following steps: receiving from at least one terminal, at least one request for executing at least one software package, by a virtual machine launched on a virtual machine launching server from files from a set of files for launching virtual machines, and selecting from a set of servers at least one server to which the request will be directed, according to a rule for distributing the execution load of virtual machines by servers of said set of servers. | 2012-12-27 |
20120331464 | VIRTUAL MACHINE SYSTEM AND VIRTUAL MACHINE SYSTEM CONTROL METHOD - A virtual machine system is provided with a processor having only two privileged modes, a low privileged mode and a high privileged mode, and achieves both a security function for protecting digital copyrighted works or the like and an operating system switching function that guarantees system reliability. The virtual machine system is provided with a first and a second processor and executes a hypervisor on the first processor in the high privileged mode. An operating system on the second processor is executed by cooperation between the hypervisor running on the first processor and a program running on the second processor in low privileged mode. This eliminates the need for running the hypervisor on the second processor in the high privileged mode, thus allowing for execution on the second processor in the high privileged mode of a program for implementing the security function. | 2012-12-27 |
20120331465 | VIRTUAL MACHINE SYSTEM, VIRTUAL MACHINE CONTROL METHOD, VIRTUAL MACHINE CONTROL APPLICATION, AND SEMICONDUCTOR INTEGRATED CIRCUIT - A memory protection unit controls access by virtual machines to memory areas. By having a hypervisor executed by a processor and the memory protection unit cooperate, access to memory areas by each virtual machine is controlled such that access to designated areas is forbidden. Accordingly, each virtual machine is unable to access programs, data, and so on stored in areas forbidden thereto. | 2012-12-27 |
20120331466 | Secure Recursive Virtualization - A mechanism is provided for performing secure recursive virtualization of a computer system. A portion of memory is allocated by a virtual machine monitor (VMM) or an operating system (OS) to a new domain. An initial program for the new domain is loaded into the portion of memory. Secure recursive virtualization firmware (SVF) in the data processing system is called to request that the new domain be generated. A determination is made as to whether the call is from a privileged domain or a non-privileged domain. Responsive to the request being from a privileged domain, all access to the new domain is removed from any other domain in the data processing system. Responsive to receiving an indication that the new domain has been generated, an execution of the initial program is scheduled. | 2012-12-27 |
20120331467 | Delivering Interrupts Directly To A Virtual Processor - Embodiments of apparatuses, methods, and systems for delivering an interrupt to a virtual processor are disclosed. In one embodiment, an apparatus includes an interface to receive an interrupt request, delivery logic, and exit logic. The delivery logic is to determine, based on an attribute of the interrupt request, whether the interrupt request is to be delivered to the virtual processor. The exit logic is to transfer control to a host if the delivery logic determines that the interrupt request is not to be delivered to the virtual processor. | 2012-12-27 |
20120331468 | DYNAMICALLY PROVISIONING VIRTUAL MACHINES - Virtual machines are managed on the basis of data obtained from a management information database of a network switch having a plurality of Ethernet links coupled to compute nodes running a plurality of virtual machines. A management entity, such as a provisioning manager, determines the amount of network bandwidth being utilized through each of the Ethernet links. Accordingly, an additional virtual machine may be provisioned to the compute node that is coupled to an Ethernet link identified as having the greatest amount of unutilized network bandwidth. | 2012-12-27 |
20120331469 | GRACEFULLY SHUTTING DOWN A COMPUTER PROCESS - A “buoy” process is associated with another “real” (i.e., non-buoy) process or application. Priorities are arranged so that, in a resource crisis, the buoy process is preferentially killed before its parent. When, during a crisis, the buoy is killed, its death is a signal to the parent process that it may be time to shut down gracefully. In some embodiments, when the parent process starts up, it launches a buoy process as its child. When the buoy process dies, the operating system sends a signal to the parent process. This signal warns the parent of the resource crisis. In other embodiments, a separate “guardian” process notes the existence of a new “parent” process, launches a buoy process, and associates the buoy with the “parent” process. The operating system informs the guardian if the buoy process is killed, and the guardian in turn informs the associated parent. | 2012-12-27 |
20120331470 | EMITTING COHERENT OUTPUT FROM MULTIPLE THREADS FOR PRINTF - One embodiment of the present invention sets forth a technique for emitting coherent output from multiple threads for the printf( )function. Additionally, parallel (not divergent) execution of the threads for the printf( )function is maintained when possible to improve run-time performance. Processing of the printf( )function is separated into two tasks, gathering of the per thread data and formatting the gathered data according to the formatting codes for display. The threads emit a coherent stream of contiguous segments, where each segment includes the format string for the printf( )function and the gathered data for a thread. The coherent stream is written by the threads and read by a display processor. The display processor executes a single thread to format the gathered data according to the format string for display. | 2012-12-27 |
20120331471 | EXECUTING MOLECULAR TRANSACTIONS - The claimed subject matter provides a method for executing molecular transactions on a distributed platform. The method includes generating a first unique identifier for executing a molecular transaction. The molecular transaction includes a first atomic action. The method further includes persisting a first work list record. The first work list record includes the first unique identifier and a step number for the first atomic action. Additionally, the method includes retrieving, by a first worker process of a runtime, the first work list record. The method also includes executing, by the first worker process, the first atomic action in response to determining that a first successful completion record for the first atomic action does not exist. Further, the method includes persisting, by the first worker process, the first successful completion record for the first atomic action in response to a successful execution of the first atomic action. | 2012-12-27 |
20120331472 | AD HOC GENERATION OF WORK ITEM ENTITY FOR GEOSPATIAL ENTITY BASED ON SYMBOL MANIPULATION LANGUAGE-BASED WORKFLOW ITEM - In one embodiment, a method comprises receiving from a user interface, by a computing device, a request for execution of at least one lambda function in an operation of a geospatial application, the geospatial application having lambda functions for operating on at least one of a workflow item or one or more entities of an ad hoc geospatial directory, the workflow item including at least one of the lambda functions for a workflow in the geospatial application; and executing by the computing device the at least one lambda function to form, in the geospatial application, a work entity that associates the workflow item with one of the entities, the work entity defining execution of the workflow on the one entity. | 2012-12-27 |
20120331473 | ELECTRONIC DEVICE AND TASK MANAGING METHOD - A task managing method is configured to manage tasks processed by an electronic device. The electronic device includes a central processing unit (CPU) capable of processing a plurality of the tasks at one time. The task managing method includes the steps of: detecting whether a predetermined status occurs; analyzing a current utilization rate of the CPU; determining whether the current utilization rate is greater than or equal to a predetermined utilization rate; and reducing some tasks being processed by the CPU to keep the CPU working normally, if the current utilization rate is greater than or equal to a predetermined utilization rate. | 2012-12-27 |
20120331474 | REAL TIME SYSTEM TASK CONFIGURATION OPTIMIZATION SYSTEM FOR MULTI-CORE PROCESSORS, AND METHOD AND PROGRAM - Disclosed is an automatic optimization system capable of searching for an allocation with a good performance from among a plurality of task allocations which can be scheduled in a system of a development target configured with a plurality of periodic tasks. A task allocation optimization system for a multi-core processor including a plurality of cores calculates a response time of each of a plurality of tasks which are core allocation decision targets, and outputs an accumulative value of the calculated response time as an evaluation function value which is an index representing excellence of a task allocation. A task allocation from which a good evaluation function value is calculated is searched based on the evaluation function value. A candidate having a good evaluation function value among a plurality of searched task allocation candidates is held. | 2012-12-27 |
20120331475 | DYNAMICALLY ALLOCATED THREAD-LOCAL STORAGE - Dynamically allocated thread storage in a computing device is disclosed. The dynamically allocated thread storage is configured to work with a process including two or more threads. Each thread includes a statically allocated thread-local slot configured to store a table. Each table is configured to include a table slot corresponding with a dynamically allocated thread-local value. A dynamically allocated thread-local instance corresponds with the table slot. | 2012-12-27 |
20120331476 | METHOD AND SYSTEM FOR REACTIVE SCHEDULING - A method and system of scheduling demands on a system having a plurality of resources are provided. The method includes the steps of, on receipt of a new demand for resources: determining the total resources required to complete said demand and a deadline for the completion of that demand; determining a plurality of alternative resource allocations which will allow completion of the demand before the deadline; for each of said alternative resource allocations, determining whether, based on allocations of resources to existing demands, said alternative resource allocation will result in a utilization of resources which is closer to an optimum utilization of said resources; and selecting, based on said determination, one of said alternative resource allocations to complete said demand so as to optimise utilisation of resources of the system. | 2012-12-27 |
20120331477 | SYSTEM AND METHOD FOR DYNAMICALLY ALLOCATING HIGH-QUALITY AND LOW-QUALITY FACILITY ASSETS AT THE DATACENTER LEVEL - A system and method are disclosed for dynamically allocating high-quality and low-quality facility assets at the datacenter level. The system and method provide an actuator with information on priorities of information technology (IT) workloads. The actuator ranks the IT workloads according to their priorities, monitors an amount of resources the IT workloads demand, and tracks total capacities of facility assets in the datacenter. The facility assets include high-quality facility assets and low-quality facility assets. According to the direction of the actuator, a distribution mechanism dynamically switches lower priority IT workloads from the high-quality facility assets to the low-quality facility assets when the high-quality facility assets are overburdened. | 2012-12-27 |
20120331478 | METHOD AND DEVICE FOR PROCESSING INTER-SUBFRAME SERVICE LOAD BALANCING AND PROCESSING INTER-CELL INTERFERENCE - The present application provides a method and device for processing inter-subframe service load balancing and processing inter-cell interference, which includes: when processing the inter-subframe service load balancing, determining a service load of a link in a time period; determining a resource utilization ratio threshold according to the service load; and transmitting service data in each subframe according to the utilization ratio threshold. The inter-subframe service load balancing is processed when the inter-cell interference is processed, and in combination with various inter-cell interference coordination technologies, interference mitigation in one of a frequency domain, power and a space domain or the combination thereof is processed by the interference coordination technology. The present application can relieve the phenomenon that the interference mitigation effect is not good as the load information can not adapt well to the dynamic change of the inter-subframe service load in a time division duplex system, and can further mitigate the inter-cell interference in a long term evolution system, and improve the entire throughput performance of the system and the service quality of the subscriber in the system. | 2012-12-27 |
20120331479 | LOAD BALANCING DEVICE FOR BIOMETRIC AUTHENTICATION SYSTEM - A load balancing device is provided that allocates, to one of a plurality of authentication servers, biometric authentication requests of users received from client terminals by comparing input biometric authentication data and registration target biometric authentication data so as to estimate a check process time, including storing a process time for an authentication request being processed for each of the authentication servers, and allocating a process for a biometric authentication request from the client terminal to an authentication server having a process time that is short by estimating a check process time on the basis of a quality of the input biometric data and a quality of registration target biometric data and referring to the process time stored in the storage unit for each authentication server when the biometric authentication request has been received from the client terminal. | 2012-12-27 |
20120331480 | PROGRAMMING INTERFACE FOR DATA COMMUNICATIONS - In embodiments of a programming interface for data communications, a request queue and a completion queue can be allocated from a user-mode virtual memory buffer that corresponds to an application. The request queue and the completion queue can be pinned to physical memory and then mapped to kernel-mode system addresses so that the request queue and the completion queue can be accessed by a kernel-mode execution thread. A request can be received from an application for the kernel to handle data in the request queue, and a system issued to the kernel for the kernel-mode execution thread to handle the request. The kernel-mode execution thread can then handle additional requests from the application without additional system calls being issued. | 2012-12-27 |
20120331481 | INTERACTION BETWEEN APPLICATIONS BUILT ON DIFFERENT USER INTERFACE TECHNOLOGIES - Various embodiments of systems and methods for interaction between applications built on different technologies are described herein. In one aspect, at least one action handler of a number of action handlers is associated with at least one application from a number of applications participating in the integrated scenario. In another aspect, at a first action handler that is associated with a source application, a request to access a target application is received. An identifier of the target application is retrieved and based on that identifier a second action handler associated with the target application is invoked, where the identifier of the target application is registered with the second action handler. The target application is launched by the second action handler in response to the received request. | 2012-12-27 |
20120331482 | Apparatus and Systems For Measuring, Monitoring, Tracking and Simulating Enterprise Communications and Processes - The present invention comprises apparatus and systems for measuring, monitoring, tracking and simulating enterprise communications and processes. A central message repository or database is constructed, comprised of monitoring messages sent from process messaging systems. The database may then be accessed or queried as desired. A simulation tool assists in reviewing present and proposed processes and sub-processes before modifying existent systems or creating new systems. | 2012-12-27 |
20120331483 | MANAGING EVENTS GENERATED FROM BUSINESS OBJECTS - A method for managing events generated from business objects in a business transactions environment is provided in the illustrative embodiments. A first event being raised by a business object in a plurality of business objects configured in a business entity is detected. The business entity executes in the data processing system and provides a function for processing a request. A determination is made whether a second event has been detected prior to the first event and during the processing of the request. In response to the determining being affirmative, first event data associated with the first event is combined with second event data stored from the second event. The combining results in consolidated event data. The consolidated event data is published in response to the request upon completing the processing of the request. | 2012-12-27 |
20120331484 | Fluent API Patterns for Managing Object Persistence - Fluent API Patterns promote balance in managing object persistence. Code which obtains an object-relational mapper session contains API Patterns that manipulate persistence ignorant objects using calls to a fluent interface. When the developer's code executes, it may manipulate an object state, a property state, and/or a persistent relationship of the persistence ignorant object. The code may implement API Patterns such as find-change-save, current-value-original-value, nested-property, incremental-graph-load, incremental-graph-filtered-load, property-modification, dictionary, and/or other API Patterns. Additional examples of API Patterns include an API Pattern to read current, original, and database values for all properties of an entity; an API Pattern to set current and/or original values from another object; and an API Pattern to create a cloned object containing current, original, and/or database values. In any or all of these situations, the API Pattern calls to the fluent interface may be written in a strongly typed language. | 2012-12-27 |
20120331485 | Flexible Event Data Content Management For Relevant Event And Alert Analysis Within A Distributed Processing System - Methods, systems, and computer program products for flexible event data content management for relevant event and alert analysis within a distributed processing system are provided. Embodiments include capturing, by an interface connector, an event from a resource of the distributed processing system; inserting, by the interface connector, the event into an event database; receiving from the interface connector, by a notifier, a notification of insertion of the event into the event database; based on the received notification, tracking, by the notifier, the number of events indicated as inserted into the event database; receiving from the notifier, by a monitor, a cumulative notification indicating the number of events that have been inserted into the event database; in response to receiving the cumulative notification, retrieving, by the monitor, from the event database, events inserted into the event database; and processing, by the monitor, the retrieved events. | 2012-12-27 |
20120331486 | Selective link aggregation in a virtualized environment - A method, system, and computer program product for managing events generated from business objects in a business transactions environment are provided in the illustrative embodiments. A first event being raised by a business object in a plurality of business objects configured in a business entity is detected. The business entity executes in the data processing system and provides a function for processing a request. A determination is made whether a second event has been detected prior to the first event and during the processing of the request. In response to the determining being affirmative, first event data associated with the first event is combined with second event data stored from the second event. The combining results in consolidated event data. The consolidated event data is published in response to the request upon completing the processing of the request. | 2012-12-27 |
20120331487 | PATTERN MATCHING DEVICE, PATTERN MATCHING METHOD, AND PATTERN MATCHING SYSTEM - Provided is a pattern matching device capable of generating an event pattern matching tree optimal for efficiently performing pattern matching assessment. The pattern matching device is provided with an event pattern table holding unit for holding an event pattern including a partial event pattern comprising a first attribute name and an attribute value; a first matching ratio measurement unit for measuring a matching ratio corresponding to the first attribute name on the basis of an event including attributes comprising a second attribute name and an attribute value and the event pattern; and an event pattern matching tree generation unit for generating an event pattern matching tree which has arranged on an upper level an attribute value matching assessment instance including the first attribute name which has the low corresponding matching ratio on the basis of the event pattern and the matching ratio. | 2012-12-27 |
20120331488 | COMPONENT NAVIGATION IN AN EXTENSIBLE APPLICATION - In one embodiment, a method receives configuration information for a set of components of an extensible application. A component in the set of components includes extending information if the component is an extension of another component and hosting information if the component is hosting a set of extension points. A computing device dynamically generates an extension structure at runtime of the application from the configuration information. The extension structure is generated by connecting components together based on the extending information and the hosting information of the set of components. A navigation request to a target component is received and a path of components to the target component is determined using the extension structure. The path of components is traversed until the target component is loaded and the target component is displayed. | 2012-12-27 |
20120331489 | BYPASSING USER MODE REDIRECTION - In one embodiment, a non-transitory processor-readable medium stores code associated with a function module included in a resource library. The code can represent instructions that when executed cause a processor to define, in response to a function hook associated with the function module, a copy of the resource library, the copy of the resource library including an unhooked copy of the function module. The code can further represent instructions that when executed cause the processor to execute the unhooked copy of the function module based on at least one policy from a plurality of policies. | 2012-12-27 |
20120331490 | Optical Disc Drive and Tray Driving Device Thereof - A tray driving device of an optical disc drive in provided to comprising: a driving motor; a belt wheel, disposed on a driving shaft of the driving motor; a belt idler, connected to the belt wheel through a belt, wherein the belt idler has a belt groove for containing the belt, and a guiding inclined plane is protruded on the top of the belt idler; and a gear assembly, connected under the belt idler and connected to a tray. | 2012-12-27 |
20120331491 | OPTICAL DISC APPARATUS - An example of an optical disc apparatus includes a top case and a bottom case. The top case includes a tab extending downward from one end of the top case. The tab includes a protrusion protruding inward. The bottom case includes a lower-side folded portion formed by folding inward an upper end of one side surface of the bottom case. The lower-side folded portion includes a cantilever spring. The cantilever spring includes a spring portion extending in a vertical direction and a curved portion formed by folding inward an upper part of the spring portion. The protrusion comes into contact with the curved portion when the top case is being affixed to the bottom case and is in contact with the spring portion under a state where the top case is affixed to the bottom case. | 2012-12-27 |
20120331492 | OPTICAL DISK PLAYER - An optical disk player includes a main body, a cover engaging with the main body, a pivot module, and a deceleration module. The pivot module includes a torsion spring, two ends of the torsion spring being fixed on the main body and the cover respectively. The deceleration module includes a first deceleration portion arranged on the main body and a second deceleration portion arranged on the pivot module. The first deceleration portion contacts the second deceleration portion and frictional forces therebetween reduces the speed of opening the cover. | 2012-12-27 |
20120331493 | OPTICAL DISC PROCESSING DEVICE AND OPTICAL DRIVE INSTALLATION DEVICE - An optical drive installation device including: a support frame that disposes a removable optical drive to an installation position; a lock mechanism that has a locking member which can move to a locked position preventing the optical drive from being removed or an unlocked position not interfering with the optical drive being removed, and supports the optical drive at the installation position of the support frame when the locking member is set to the locked position; an unlocking mechanism that releases the lock mechanism from the locked position; and a pushing member that pushes the optical drive in the direction in which the optical drive is removed from the installation position. | 2012-12-27 |
20120331494 | METHOD AND SYSTEM FOR OBTAINING VIEWING DATA AND PROVIDING CONTENT RECOMMENDATIONS AT A SET TOP BOX - A system and method for generating television recommendations includes a viewer tracking module that tracks viewer events to form a viewer tracking log. A recommendation module that determines a timeslot, generates a timeslot viewing profile based on the timeslot. The viewer tracking log corresponds to television programs watched previously at the user device during the timeslot. The recommendation module compares the timeslot viewing profile with available content for the timeslot and generates a content recommendation list. | 2012-12-27 |
20120331495 | APPARATUS AND METHOD FOR PROVIDING SERVICE USING A PORTABLE TERMINAL IN TELEVISION - According to one embodiment, a method for providing a service using a portable terminal in communication with a television (TV) includes analyzing an image inputted from a camera to determine the number of users, collect user information from a terminal, and determine a type of a service to be provided based on the number of users and the collected user information. | 2012-12-27 |
20120331496 | METHODS AND APPARATUS FOR PRESENTING SOCIAL NETWORK CONTENT IN CONJUNCTION WITH VIDEO CONTENT - Methods and apparatus for generating, distributing, and/or presenting social networking content in conjunction with video content are described. In accordance with various embodiments, social networking related information, e.g., comments, remarks and/or a twitter feed, are displayed in conjunction with the display of video to which the social networking information relates. The social networking related information may be displayed on the same or a different device from that which is used to display the video comments. In some embodiments, the social networking information, e.g., comments on a program, event or broadcast, are displayed on a personal computer or other device such as a mobile telephone, while video content is being viewed, e.g., on a television which is provided video content via a set top box. A knowledgeable moderator can review, supplement, add and delete comments in real time enhancing the overall social networking session. | 2012-12-27 |
20120331497 | Digital Television Channel Trending - Channel trending, including determining a number of viewers watching a multimedia program, is achieved in a digital television network. Cached multimedia frames that correspond to portions of the multimedia program are maintained, for example, on a device located on an edge (i.e., in a network edge device) of the digital television network. In response to a request from a client device (e.g., a set-top box) to receive the multimedia program, cached multimedia frames are fed from the edge device to the client device. Upon a seamless transfer or handoff resulting in a simulcast replicator or multicast replicator providing further portions of the multimedia program, a signal (e.g., a simple network management protocol TRAP statement) is sent to a viewership statistic server for incrementing a counter. | 2012-12-27 |
20120331498 | COOPERATIVE SYSTEM FOR MEASURING ELECTRONIC MEDIA - A cooperative electronic media measurement system is disclosed that measures the electronic media usage of one or more individuals by a media research entity. The media research entity defines at least one specialized task useful to the media research entity. The at least one specialized task is performed by a media handler provided by another entity and concerns a handling of electronic media by the media handler. The individual is tracked with at least one software agent of the media research entity. At least one software agent obtains a product of the specialized task performed by the media handler via at least one defined interface that provides interoperability between the media handler and the at least one software agent. Cooperative media handlers automatically obtain information from, or otherwise obtain information about, presented media objects including identification tags, if present, and other information, for collection by the research data collection agents. | 2012-12-27 |
20120331499 | System and Method for Video Recording, Management and Access - A server-based hosted application used to transmit and manage multiple media across the Internet. Digital video recorders (DVRs) collect media (such as video with or without audio) and record it to a local disk. DVRs are located in sites or stores where they are attached to cameras, microphones and point-of-sale (POS), or other data collection devices. The DVR accesses the Internet through a typical “residential” broadband connection. A hybrid peer-to-peer network allows peers (a DVR and an Internet browser) to directly transmit and receive video and audio (and other information, such as POS data). A hosted infrastructure tracks the presence of DVRs. A server-based application exposes a presence database to users. Users find DVRs via an Internet interface. Viewers can then connect to the DVR and its corresponding media collection devices (such as cameras, microphones and POS devices) and control collection and use of media information directly. | 2012-12-27 |
20120331500 | Providing Remote Access to Multimedia Content - Remote access to multimedia content is provided to hardware devices that have been predesignated as approved. For example, a customer premises equipment (CPE) device such as a set-top box may transmit digital television content to a mobile telephone. The multimedia content may be simulcast to multiple remote hardware devices by the CPE device. | 2012-12-27 |
20120331501 | LOW-PASS FILTER CIRCUIT - This disclosure relates generally to community access or cable television (CATV) signals and to in-home entertainment signals sharing a CATV distribution network. A low-pass filter is disclosed which can be used to restrict in-home entertainment signals that are using the CATV distribution network from leaving a subscriber premise network. The low-pass filter is placed at an entry port of a CATV subscriber premise network. The low-pass filter allows both upstream and downstream CATV signal frequency bands to enter and exit the subscriber premise network. The low-pass filter blocks signals in the in-home entertainment frequency band from exiting the subscriber premise network. The low-pass filter includes at least one LC resonant circuit element, and at least one mechanical resonant circuit element. The low-pass filter is sized small enough that it can fit in existing CATV equipment. | 2012-12-27 |
20120331502 | METHOD AND APPARATUS FOR AUTOMATICALLY CREATING MEDIA STREAMS - A method for creating a media stream comprising a plurality of individual media segments includes obtaining a first media segment, obtaining a first matching criterion, and automatically associating the first media segment with a second media segment to produce the media stream. | 2012-12-27 |
20120331503 | System and Method for Enhanced Hot Key Delivery - A method includes receiving, at a head-end, content to be provided to a particular subscriber. The method includes creating an indicator configured to provide to a subscriber side system an indication of an availability of alternated content based on the content. The method further includes sending the indicator and the content separately to the subscriber side system over different networks. | 2012-12-27 |
20120331504 | APPARATUS AND METHOD FOR EXECUTING APPLICATION IN MOBILE TERMINAL PROVIDING BROADCAST RECEIVING SERVICE - A mobile terminal provides a broadcast receive service. More particularly, an apparatus and a method executes an application installed in advance via a channel change of a broadcast service. The apparatus includes a communication unit, a channel register unit, a channel determining unit, a memory unit, and a controller. The communication unit communicates with a remote controller to receive a control signal of the remote controller. A channel register unit registers an application installed in advance in a broadcast channel allocated to the mobile terminal to update channel information. A channel determining unit determines a channel changed by a user's remote controller manipulation. A memory unit stores channel information updated by the channel register unit. A controller processes to execute an application depending on a channel change of the remote controller. The channel determining unit determines the channel information to determine an application registered in the changed channel. | 2012-12-27 |
20120331505 | METHOD FOR DISPLAYING PROGRAM INFORMATION AND IMAGE DISPLAY APPARATUS THEREOF - A method and apparatus for displaying information are discussed. According to an embodiment, the method includes obtaining, by an image display apparatus, viewing history information on a plurality of programs or channels based on a previous viewing of the plurality of programs or channels; generating priority information for the programs or channels based on the obtained viewing history information; and visually indicating, on a display unit of the apparatus, a plurality items corresponding respectively to the plurality of programs or channels to be distinct from each other according to the generated priority information. | 2012-12-27 |
20120331506 | USER INTERFACE AND CONTENT INTEGRATION - In one embodiment, a method of controlling a user interface can include: displaying a plurality of objects on a display screen, where each of the plurality of objects represents media content; accepting, by a computing device, a signal indicating user selection of an object from the plurality of objects; determining personal relevancy data associated with the selected object, where the personal relevancy data is determined by using a recommendation engine and at least in part by accessing content from a social network; playing the media content represented by the selected object, where the media content is displayed in a background on the display screen; and displaying the personal relevancy data in a foreground on the display screen. | 2012-12-27 |
20120331507 | SYSTEMS AND METHODS FOR PROVIDING LOCAL EVENT LISTINGS WITH VIDEO - Systems and methods are provided for generating an integrated event listing. An event promoter may input event information about a local event. In response, online videos corresponding to the event information may be identified and provided to the event promoter. The event promoter may select one or more of the identified online videos to integrate with the event information to generate the integrated event listing. For example, the integrated event listing may be generated by displaying the one or more selected online videos as a video background behind a scrolling text overlay of the event information. | 2012-12-27 |
20120331508 | Accessing Service Guide Information In A Digital Video Broadcast System - Apparatuses may perform and methods may include receiving a digital broadcast signal that includes a physical layer pipe identified by a predetermined identifier indicating that the physical layer pipe includes service guide bootstrap information. The bootstrap information may identify one or more service guides available for download. The physical layer pipe may include header information that identifies one or more other physical layer pipes containing portions of the service guides identified in the bootstrap information. Based on the bootstrap information and header information, a selected service guide is retrieved and presented to a user. | 2012-12-27 |
20120331509 | CHANNEL SELECTION IN A MULTIMEDIA SYSTEM - A method for a client module to provide a channel selection request in a multimedia system begins by receiving an input signal from a client. The method continues by interpreting the input signal to determine type of signal. The method continues, when the type of signal is control information, by determining whether the control information relates to a local command or a system-level command. The method continues, when the control information relates to a system-level command, by processing the control information for conveyance to a multimedia server to produce a control message. The method continues by transmitting the control message to the multimedia server. | 2012-12-27 |
20120331510 | METHOD, SERVER AND SYSTEM FOR PROVIDING REAL-TIME VIDEO SERVICE IN TELECOMMUNICATION NETWORK - Embodiments of the present invention provide a method, a server and a system for providing a real-time video service in a telecommunication network. The method includes: receiving a video content obtaining request from a telecommunication video resource platform; obtaining, according to the video content obtaining request, data content that is of a web server and corresponds to the video content obtaining request; converting the data content into display content in a video form; and sending the display content in the video form. In the embodiments of the present invention, a capability of generating video content in real time according to dynamic information is achieved, and the real-time video service is provided in the telecommunication network. | 2012-12-27 |
20120331511 | INTELLIGENT CAR A/V SYSTEM - An intelligent car A/V system includes a main unit installed in a center console of a dashboard of a car and having built therein a control system, a power converter, a FM/AM receiver module, a digital TV receiver module, a DVD/SD/USB multimedia player module, a car camcorder, a reversing video display type driver assistance system, a GPS receiver module and an audio amplifier system, and a tablet PC electrically connectable to the control system of the main unit for operation under the control of the control system and having built therein an operating system, a satellite-based navigation system, a system operation control software, a wireless network communication system, a display system, a touch control system, a multimedia/entertainment DVD player system and an internet operating system. | 2012-12-27 |
20120331512 | AV CONTENTS VIEWING AND LISTENING SYSTEM PROVIDED IN CABIN OF PASSENGER CARRIER - An AV contents viewing and listening system includes a seat terminal apparatus, a compact terminal apparatus, and a display terminal apparatus. The seat terminal apparatus is connected to an AV server that stores AV contents to be distributed including video data and audio data via a transmission path, receives and outputs at least the audio data. A compact terminal apparatus is connected to the seat terminal apparatus via a terminal apparatus transmission path, and receives and displays at least the video data, and a display terminal apparatus receives the video data from the compact terminal apparatus and display the data. The video data is displayed one of by selective changeover between the compact terminal apparatus and the display terminal apparatus, and by simultaneously display on both of the compact terminal apparatus and the display terminal apparatus. | 2012-12-27 |
20120331513 | CONTENT DELIVERY APPARATUS, CONTENT DELIVERY METHOD, AND TRANSMITTING SERVER - The delivery of content is performed over a cable network with a high capacity, and data for control is exchanged over an IP network. A VoD channel is allocated to a bandwidth of a cable network (1) which is divided for every region beforehand, and thus the VoD channel is dynamically allocated in response to the demand for VoD streaming from an end device ( | 2012-12-27 |
20120331514 | METHOD AND APPARATUS FOR PROVIDING IMAGE-ASSOCIATED INFORMATION - A method of providing image-associated information by an image-associated information providing apparatus includes receiving broadcasting image information from a mobile device, searching an object that matches the broadcasting image information, extracting image-associated information that matches the found object and transmitting the extracted image-associated information to the mobile device. | 2012-12-27 |
20120331515 | Programming Content Reconstruction in a Content Delivery System - Methods and apparatuses for programming content reconstruction in a content delivery system are described. In one embodiment, a method to repair programming content at a receiver controller includes receiving a programming content on the receiver controller from a broadcast transmission; identifying, if present, a portion of the programming content received on the receiver controller that is corrupted; determining in a broadband network, other servers and receiver controllers connected to the broadband network that have an uncorrupted version of the corrupted portion of the programming content; sending a request to one of the other servers and receiver controllers for the uncorrupted version of the corrupted portion of the programming content and receiving the uncorrupted version of the corrupted portion of the programming content from the one of the other servers and receiver controllers. Other embodiments are also described. | 2012-12-27 |
20120331516 | Method for Personalizing Parental Control in a PCC Architecture - A Parental Control Manager “PCM” server of a Policy and Charging Control “PCC” architecture with the Parental Control Manager “PCM” server, a Policy Control Enforcement Function device with Deep Packet Inspection capabilities “PCEF-DPI device”, and a Policy Control Rules Function “PCRF” server. The PCM server includes a user interface unit for receiving a logon from a user, and for receiving from the user monitoring criteria on Internet traffic types to be monitored for the user, and corresponding actions to be carried out when any monitoring criteria fit a given Internet traffic type. The PCM server includes a network interface unit for submitting the monitoring criteria and corresponding actions received from the user to a PCRF server. A PCRF server of a PCC architecture with a PCM server, a PCEF-DPI device, and the PCRF server. A PCEF-DPI device of a PCC architecture with a PCM server, the PCEF-DPI device, and a PCRF server. A method of parental control by a user for access to websites, multimedia contents and Internet services with a PCC architecture having a PCM server, a PCEF-DPI device, and a PCRF server. | 2012-12-27 |
20120331517 | METHOD AND SYSTEM FOR FILTERING OBSCENE CONTENT FROM ELECTRONIC BOOKS AND TEXTUALIZED MEDIA - A method and system is disclosed for filtering obscene content from digital media comprising textualized script, such as electronic books commonly read on iPads®, Kindles®, and the like. Obscene content, in some embodiments, is redacted from the textualized media. In other embodiments, the obscene content is substituted with less obscene content. In still further embodiments, obscene content is flagged and a reader or administrator prompted to instruct the system how to handle the obscene content. | 2012-12-27 |
20120331518 | FLEXIBLE SECURITY TOKEN FRAMEWORK - A computer-implemented server system includes or supports applications that use security tokens. The server system includes a security token module to create token types for use with the applications, to generate security tokens corresponding to created token types, and to enforce token use policies for generated security tokens. The server system also includes a database to store security tokens for the token module. The token module accommodates creation of different token types having different token formats and different token use policies, based on obtained values of a plurality of token configuration variables. The token module generates security tokens in accordance with the different token formats, and enforces the different token use policies when processing incoming security tokens. | 2012-12-27 |
20120331519 | DEVELOP AND DEPLOY SOFTWARE IN MULTIPLE ENVIRONMENTS - Developing, deploying, and operating an application in a plurality of environments is disclosed, including: defining runtime specific configuration information for a plurality of environments, wherein the runtime environment specific configuration includes topology configuration and security configuration, wherein the runtime environment specific configuration information is stored separately from other configuration information and is protected by an identity management system; executing an application in one of the plurality of environments, wherein execution of the application is controlled by a first role; and presenting a credential associated with the first role to the identity management system to obtain a portion of the runtime environment specific configuration information corresponding to the environment associated with the executing application. | 2012-12-27 |
20120331520 | Method and System for the Transmission of Wireless Data Stream - The disclosure provides a method and a system for transmitting wireless data stream. After a user equipment (UE) sends a packet data protocol (PDP) context activation request signaling to a base station, the base station checks whether the user equipment is allowed to activate a local Internet protocol access (LIPA) function. If the base station decides that the user equipment is allowed to activate the LIPA function, the base station informs a core network which executes authentication accordingly. The base station disconnects from the core network. The base station assigns a private IP address to the user equipment for implementing the LIPA function, so that the user equipment having the private IP address is directly connected to an external network through the base station without going through the core network. | 2012-12-27 |
20120331521 | SYSTEM AND METHOD FOR APPLICATION CENTRIC CLOUD MANAGEMENT - An application-based cloud management system and method are provided. The cloud management method comprises authenticating a user to access a cloud network, determining a user behavior of the authenticated user using one or more metadata stored in a cache memory, loading resources related to the user behavior to a virtual machine, and allocating the virtual machine to the authenticated user. | 2012-12-27 |
20120331522 | SYSTEM AND METHOD FOR LOGICAL SEPARATION OF A SERVER BY USING CLIENT VIRTUALIZATION - A system for logically separating a server using client virtualization includes a client terminal including a virtual environment generation unit for generating a virtual environment, and a virtualized server including a local storage unit, an authentication server for performing authentication on the client terminal when a request for access to the local storage unit is received from a process executed in the virtual environment, and a virtualization filter drier for allowing or blocking the access request to the local storage unit based on the authentication result of the client terminal. The client terminal further includes a virtualization filter drives for transmitting the access request from the process executed in the virtual environment to the local storage unit, and blocking the access request from the process without being made through the virtual environment to the local storage unit. | 2012-12-27 |
20120331523 | Wireless access device and method - The disclosure discloses a wireless access device ( | 2012-12-27 |
20120331524 | NETWORKING AS A SERVICE - Networking as a Service (NaaS) delivers network services using remote appliances controlled by a hosted, multi-tenant management system. The system may include a heartbeating process for communication between a web-based server and appliances, in which the appliances periodically contact the management system on the server. The heartbeating process allows the appliances to maintain a completely up-to-date configuration. Furthermore, heartbeating allows for comprehensive monitoring of appliances and for software distribution. The system may also include means for authenticating appliances, without the need for pre-installed PSKs or certificates. | 2012-12-27 |
20120331525 | PORTAL BRAND MANAGEMENT - Apparatus, systems, and methods may operate to receive, from a node associated with a console owner, an authenticated access request for access to a network portal. Additional activities may include accessing a branding file associated with the console owner, and responsive to the receiving, generating a branded version of a graphical user interface having one or more background colors, a display structure, and a set of uncolored icons. The background color(s) and the icons may be selected based on information stored in the branding file. The branded version may be published to grant access to the network portal, displaying the uncolored icons in front of the background color(s) so that the background color(s) are visible through transparent portions of the uncolored icons. Additional apparatus, systems, and methods are disclosed. | 2012-12-27 |