Patents Assigned to IBM Corporation
-
Publication number: 20020174362Abstract: A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. A system management framework monitors multiple sources of network packets within the distributed data processing system. After identifying a source of network packets that generates network packets that surpass a predetermined threshold limitation on small packet size, a system administrator is alerted to the identified source of network packets. At the discretion of the system administrator, execution of the identified source can be paused, stopped, or restarted.Type: ApplicationFiled: March 29, 2001Publication date: November 21, 2002Applicant: IBM CorporationInventors: Lorin Evan Ullmann, Ching-Jye Chang
-
Publication number: 20020174083Abstract: Systems and methods for instance counting and for the identification of a temporal pattern in an event sequence. The system addresses the use of “earliest-first” and “no-reuse” policies as criteria for the correctness of counting. The system also achieves higher performance than conventional methods by utilizing incremental computation.Type: ApplicationFiled: May 17, 2001Publication date: November 21, 2002Applicant: IBM CorporationInventors: Joseph L. Hellerstein, Sheng Ma, Chang-Shing Perng
-
Publication number: 20020147714Abstract: A method, apparatus, and article of manufacture for optimizing a query being performed by a computer system to retrieve data from a database stored on the computer system. The query is analyzed to identify any joins therein that are lossless and to identify any tables of the identified joins that are eligible for removal. This analysis includes partitioning the joins into lossless and lossy joins, and partitioning the tables of the joins according to their associated quantifiers, wherein each of the quantifiers has a quantifier state indicating whether the table participates in a join that is lossless. The query is then rewritten to eliminate the identified tables that are eligible for removal.Type: ApplicationFiled: May 23, 2002Publication date: October 10, 2002Applicant: IBM CorporationInventors: Fred Koo, Ting Yu Leung
-
Publication number: 20020147675Abstract: Automatic electronic bidding for goods or services. In one embodiment, the history of bids or asks is examined to determine which have resulted in trades within a prescribed span of time. This information plus, possibly, some additional auxiliary information is used to estimate, for one or more candidate prices within a prescribed range, the likelihood for a bid or ask at that price to result in a trade; an optimal price is selected using this set of bid/ask prices and trade probabilities plus additional information about privately held information about reservation prices, etc. to compute an optimal bid/ask price or modify an existing bid/ask; and the auctioneer is sent a message conveying the chosen new or modified optimal bid/ask price.Type: ApplicationFiled: April 10, 2001Publication date: October 10, 2002Applicant: IBM CorporationInventors: Rajarshi Das, James E. Hanson, Jeffrey O. Kephart, Gerald J. Tesauro
-
Publication number: 20020144119Abstract: A methodology is presented for a network single sign-on (SSO) authentication process using digital certificates. A user has access to protected resources, such as legacy applications, that require verification of a user's authentication data prior to providing access. The user's authentication data is encrypted using the public key of the user, and an attribute certificate containing the encrypted authentication data is generated by an attribute-certificate-issuing authority. When a user requires access to the protected resource, an SSO agent performs an initial authentication process against the user. The SSO agent then retrieves the user's attribute certificate, and for subsequent authentication requests for other protected resources, the SSO agent uses the authentication data from the attribute certificate that corresponds to the targeted protected resource.Type: ApplicationFiled: March 29, 2001Publication date: October 3, 2002Applicant: IBM CorporationInventor: Messaoud Benantar
-
Publication number: 20020144246Abstract: A lexical analyzer for processing computer programming languages is provided. The lexical analyzer can detect single character or multi-character delimiters, as well as single and/or multi-character delimiter-tokens included in an input stream. In response to detecting a delimiter, the lexical analyzer returns a token representing a string immediately preceding the delimiter in the input stream. Upon detecting a delimiter-token, the lexical analyzer stores the delimiter-token, and returns it on a subsequent call to the analyzer.Type: ApplicationFiled: March 29, 2001Publication date: October 3, 2002Applicant: IBM CorporationInventor: Seong R. Yu
-
Publication number: 20020140486Abstract: A reference clock of frequency F is used to generate a quadrature clock at the same frequency F without generating frequencies higher than F. A multiphase voltage-controlled oscillator (MVCO) has a nominal frequency less than F is used in a feedback circuit with a multiple phase (MP) phase detector that which operates on the multiple phases of the MVCO. The multiple phases of the MVCO are sampled at and latched on both edges of the reference clock to generate phase detector outputs which are combined in combinational logic to generate Sync State outputs. The Sync State outputs are used in combination with the multiple phase outputs to generate an error signal with is operable to generate a control voltage which controls the frequency of the MVCO and to generate a shifted clock which is divided in a sequential circuit to generate the quadrature clock with a frequency F.Type: ApplicationFiled: November 28, 2001Publication date: October 3, 2002Applicant: IBM CorporationInventors: David William Boerstler, Robert Keven Montoye, Kevin John Nowka
-
Publication number: 20020143542Abstract: Building a data-driven text-to-speech system involves collecting a database of natural speech from which to train models or select segments for concatenation. Typically the speech in that database is produced by a single speaker. In this invention we include in our database speech from a multiplicity of speakers.Type: ApplicationFiled: March 29, 2001Publication date: October 3, 2002Applicant: IBM CorporationInventor: Ellen M. Eide
-
Publication number: 20020143528Abstract: Methods and apparatus, in the context of speech recognition, for compensating in the cepstral domain for the effect of an interfering signal by using a reference signal.Type: ApplicationFiled: March 14, 2001Publication date: October 3, 2002Applicant: IBM CorporationInventors: Sabine Deligne, Ramesh A. Gopinath
-
Publication number: 20020138235Abstract: An apparatus, system and method for reporting field replaceable unit (FRU) replacements to a user are provided. The apparatus, system and method identify a FRU Replacement Order for an identified system error and then determines which of the FRUs in the FRU Replacement Order have already been replaced within a predetermined period of time from the current time. Those FRUs identified as having already been replaced are then flagged. The FRU Replacement Order is then output to the user with the flagged FRUs being output in a different manner than the other FRUs in the FRU Replacement Order.Type: ApplicationFiled: March 8, 2001Publication date: September 26, 2002Applicant: IBM CorporationInventors: Mark S. Edwards, Margaret E. Gretta, Arthur J. Tysor
-
Publication number: 20020138263Abstract: Methods and apparatus for enhancing the accuracy and efficacy of speech recognition in an environment, such as the interior of an automobile or home, in which there may be significant ambient noise, such as music from loudspeakers within an automobile or programming from a television within a home.Type: ApplicationFiled: January 31, 2001Publication date: September 26, 2002Applicant: IBM CorporationInventors: Sabine Deligne, Nagendra K. Goel
-
Publication number: 20020138249Abstract: Apparatus, and associated methods, for transforming an image. The apparatus includes an aiming device to be aimed at an original stationary image, a transforming device which transforms the image into a revised image, and a displaying device which displays the revised image. The revised image may be related linguistically or pictographically to the original stationary image, or the revised image includes a label assigned to at least one pictographic property of the original stationary image. Uses of the apparatus include, but are not limited to, translating text from one language to another, simplifying text within the same language and labelling text with one or more pictographic icons. The apparatus can include glasses or goggles that are worn by a user and in which an image, corresponding to the revised image, is projected or displayed on at least one lens area.Type: ApplicationFiled: January 31, 2001Publication date: September 26, 2002Applicant: IBM CorporationInventors: Dimitri Kanevsky, Jeffrey S. Sorensen
-
Publication number: 20020138434Abstract: A method, apparatus, and computer implemented instructions for managing access to data in a keystore in a data processing system. A request for access to an item of data is received from a requestor, wherein the item of data is encrypted using a key. A determination of whether the requestor is a trusted requestor is made. The key and the item of data are sent to the requestor in response to a determination that the requestor is a trusted requestor.Type: ApplicationFiled: December 29, 2000Publication date: September 26, 2002Applicant: IBM CorporationInventors: Lok Yan Leung, Anthony Joesph Nadalin, Bruce Arland Rich, Theodore Jack London Shrader
-
Patent number: 6452413Abstract: A signal sensor is provided that includes a substrate, an input port formed on the substrate as a substantially linear conductive element, and a sensing port formed on the substrate adjacent to the input port. The sensing port is influenced by magnetic flux emanating from the input port such that a sense signal is generated in the sensing port. The sensing port can have as little as one sensing loop disposed on one side of the input port, but preferably includes at least one sensing loop on each side of the input port. The sensing loops on each side of the input port have an opposite sense of turn so that the sense signals in each loop are additive. A cross-over connector provides an electrical connection between the loops of the sensing port on opposite sides of the input port. The cross-over connector can be an underpass crossing below the input port or an overpass crossing above the input port. If desired, multiple sensing loops can be formed on each side of the input port.Type: GrantFiled: November 14, 2000Date of Patent: September 17, 2002Assignee: IBM CorporationInventor: Joachim Norbert Burghartz
-
Patent number: 6453321Abstract: A technique for creating and using a structured cache to increase the efficiency of reading persistent objects from a database. The structured cache is comprised of an object cache, an associations cache, and a data cache. Data read-ahead is used to retrieve rows from a relational database in advance of an application's need for the data. Entries are created in the data cache and association cache as the rows are processed. The data cache stores data in unstructured binary format, delaying the expense of instantiation until an object is requested by the application. At that time, data is retrieved from the data cache, an object is instantiated from the data, and an entry is created in the object cache. This approach also saves storage space that would be wasted if objects were instantiated upon retrieval, but never used. The association cache stores members of an association, organized by member key within owner key for each association.Type: GrantFiled: February 11, 1999Date of Patent: September 17, 2002Assignee: IBM CorporationInventors: Justin H. Hill, Timo J. Salo
-
Publication number: 20020129331Abstract: A method, program and system for mapping ASN.1 data to an object model are provided. The invention consists of identifying the start of a data stream and then generating a new object name for the data. Next, the data is parsed to get the identifier and the data length. Then the data's tag type is analyzed. If the tag type is simple, a class diagram is generated for the data and then the source code for the data is generated. If the tag type is not simple, a subroutine is called to further parse the data before generating the class diagram and source code.Type: ApplicationFiled: December 15, 2000Publication date: September 12, 2002Applicant: IBM CorporationInventors: Xiaoyan Zhang, Randy Scott Humphrey, Theodore Jack London Shrader, Davis Kent Soper
-
Publication number: 20020126407Abstract: A “snake-in-the-box” (SITB) code is used to encode a track identifier (TID) in a servo sector of a disk drive to identify a particular track on the disk surface. The SITB code describes the longest possible vector that can fit into a finite space, and comprises a type of difference-preserving code. When an SITB code is used for the TID, any single bit error in the TID will be detected. The Hamming distance for TIDs of adjacent tracks is 1 with a SITB code, as with a Gray code. However, for TIDs of tracks that are not adjacent, the Hamming distance is at least 2 with a SITB code.Type: ApplicationFiled: January 5, 2001Publication date: September 12, 2002Applicant: IBM CorporationInventors: Mario Blaum, Tuvi Etzion
-
Publication number: 20020124148Abstract: A method, system and program for controlling access to computer memory are provided. The present invention comprises receiving a work request from a user, wherein the work request comprises an index portion and a protection portion. The index portion of the work request is used to locate an element in an address translation and protection table. The protection portion of the work request is then compared with a protection key in the table element, and access to memory is granted only if the protection portion and protection key match.Type: ApplicationFiled: March 1, 2001Publication date: September 5, 2002Applicant: IBM CorporationInventors: Bruce Leroy Beukema, David F. Craddock, Ronald Edward Fuhs, Thomas Anthony Gregg, Renato John Recio, Steven L. Rogers, Bruce Marshall Walk
-
Publication number: 20020124117Abstract: A method, system and program for controlling access to memory areas within a computer are provided. The invention comprises placing a first Bind Work Queue Element (WQE) at the head of a work queue, wherein the first Bind WQE defines parameters associated with a first Memory Window. A set of Work Requests is then placed on the work queue, behind the first Bind WQE wherein the work requests invoke operations that access the first Memory Window. A second Bind WQE is then placed on the work queue, behind the first set of Work Requests. This second Bind WQE defines parameters associated with a second Memory Window. A second set of Work Requests is placed on the work queue behind the second Bind WQE and invoke operations that access the second memory window. The Memory Windows can be associated with a common Memory Region and have different addresses and lengths or different access rights. In another embodiment, the first and second Memory Windows can be associated with different Memory Regions.Type: ApplicationFiled: March 1, 2001Publication date: September 5, 2002Applicant: IBM CorporationInventors: Bruce Leroy Beukema, David F. Craddock, Ronald Edward Fuhs, Thomas Anthony Gregg, Renato John Recio, Steven L. Rogers, Bruce Marshall Walk
-
Patent number: 6445626Abstract: A column redundancy architecture system for an embedded DRAM (eDRAM) having a wide data bandwidth and wide internal bus width is disclosed which provides column redundancy to defective datalines of the eDRAM. Internally generated column addresses of defective columns of each micro cell block are stored in a memory device during eDRAM array testing. Two redundancy reroute mechanisms are disclosed. The first redundancy reroute mechanism selects at least one defective dataline of the eDRAM and directly replaces the defective dataline(s) with at least one redundancy dataline. The second redundancy reroute mechanism discards the defective dataline column and replaces it with an adjacent dataline column. The dataline columns following the defective dataline column are then replaced with the next adjacent dataline columns including a redundancy dataline column.Type: GrantFiled: March 29, 2001Date of Patent: September 3, 2002Assignee: IBM CorporationInventors: Louis L. Hsu, Rajiv V. Joshi, Gregory J. Fredeman