Abstract: A information search and navigation system indexes, categorizes and condenses data from text or other documents. In various embodiments, the invention further can utilize user information goals, document or website types and multi-page link path options that together provide a fast, multi-page Web navigation system.
Abstract: A method or system or apparatus provides improved digital communication. In one aspect, flow control in performed by receiving status preprended to data units in a combined data channel, where the status data indicated the available status of a number of far end receiving channels. Thus data may be sent only to available receiving channels. In a further aspect, a frequency reference may also be transmitted by including data in data units in a combined channel. In a further aspect, an active channel can be selected among two redundant channels by use of an active bit in said data units. The invention has particular applications to ATM-type communication systems and may also be used in other communication systems.
Type:
Grant
Filed:
May 19, 2000
Date of Patent:
September 28, 2004
Assignee:
PMC-Sierra, Inc.
Inventors:
Jonathan David Loewen, John Richard Bradshaw, Jeffery John Brown
Abstract: A system to maximize the effectiveness of managing capital campaigns, annual funds, and fund-raising projects. The invention in one embodiment includes a special software package designed to manage the complexities of campaigns. In specific embodiments, the invention also involves data items and structures, reporting formats and features, and software and/or business methods for effectively managing fundraising campaigns.
Type:
Grant
Filed:
December 18, 2000
Date of Patent:
July 20, 2004
Assignee:
The Focus Group, LLC
Inventors:
William D. Hautt, Cara D. Hautt, Louis M. Bakos
Abstract: A first network element includes or is associated with a query engine that allows it to retrieve operating parameters from a second network element even when the first and second network elements are not participating in a common routing protocol. The first element is thereby able to determine if the second network is operational and to take action to reroute data to a backup element if the second element is not operational.
Abstract: A method and/or system and/or apparatus for a molecular-based FET device (an m-FET) uses charge storing molecules between a gate and channel of an FET-type transistor. Further embodiments describe fabrication methods for using combinations of standard practices in lithography and synthetic chemistry and novel elements.
Type:
Grant
Filed:
December 14, 2001
Date of Patent:
January 6, 2004
Assignee:
The Regents of the University of California
Inventors:
Veena Misra, David F. Bocian, Werner G. Kuhr, Jonathan S. Lindsey
Abstract: Methods and apparatus for a bird feeder that is formed of two vessels with detachable connectors between. The two vessels include a reservoir that stores feeding material and a feeding vessel with openings allowing birds to feed.
Abstract: A computer has its programs in instructions and operand descriptors to specify the operands of the instructions. Apparatus for identifying data coherency and encaching requirements and providing access control in a computer system with operands of its instructions specified by operand descriptors is described hereby. In a computer system wherein data items (operands) are represented by operand descriptors that can comprise object numbers, addresses, data types and sizes, vector information and other relevant information concerning the operands, with one bit to identify if the data coherency is to be maintained, another bit to identify if the data is cached, and a field to provide information on the privilege of Read, Write and Execute, and Supervisor or User mode. When an operand is accessed, the respective access control code is checked to validate if any protection is violated, whether caching is activated and whether it is required to maintain data coherency.
Abstract: A system and method for rewriting software into a protected form, called cloaked software, such that this cloaked form is protected from analysis or reverse engineering while at the same time the cloaked software is executable. Further, said cloaked software may be set up so that it requires a correct key or keys to be supplied, when it is to be run, for it to execute correctly. Cloaking modifies the basic operations within the software so that the logical connections or data flow among the program operations is no longer visible. In fact, cloaking makes the correct dataflow among operations dependent on a complex interrelated set of addressing operations within the cloaked program. These addressing operations are designed so that their analysis is equivalent to a computationally intractable NP-complete problem. This situation prevents reverse-engineering and unauthorized tampering.