Abstract: A digital document browsing system includes: a layout engine for determining the layout of a digital document based on previously obtained historical data for a display form of the digital document, a summarization engine for preparing a summary for the sentences of the digital document based on the historical data for the digital document. Further included is a view generator for arranging the summary obtained by the summarization engine in accordance with the layout, and for generating data relating to the display form of the digital document. A user interface for displaying the digital document on a display device based on the data related to the display form is still further included.
Abstract: A T-RAM array having a plurality of T-RAM cells is presented where each T-RAM cell has dual vertical devices. Each T-RAM cell has a vertical thyristor and a vertical transfer gate. The top surface of each thyristor is coplanar with the top surface of each transfer gate within the T-RAM array to provide a planar cell structure for the T-RAM array. A method is also presented for fabricating the T-RAM array having the vertical thyristors, the vertical transfer gates and the planar cell structure.
Abstract: The present invention provides a method for detecting a termination of a process within a plurality of processes in a data processing system. A monitoring policy is established, within the plurality of processes, wherein the monitoring policy assigns a first process within the plurality of processes to monitor a second process within the plurality of processes. Responsive to a termination of execution of the second process, a cause of the execution termination is determined by the first process. Responsive to a determination that the second process terminated execution in an abnormal manner, the first process attempts to restart the second process. Furthermore, the present invention provides a method for inserting a process within a plurality of processes containing a first process and a monitoring policy in a data processing system. A request is received from a second process to join the plurality of processes.
Abstract: Hierarchical built-in self-test methods and arrangement for verifying system functionality. As a result, an effective built-in self-test methodology is provided for conducting complete system-on-chip testing, to ensure both the circuit reliability and performance of system-on-chip design. As an added advantage, development costs are reduced for system-on-chip applications.
Type:
Application
Filed:
May 23, 2001
Publication date:
November 28, 2002
Applicant:
IBM Corporation
Inventors:
Howard H. Chen, Louis L. Hsu, Li-Kong Wang
Abstract: A liquid crystal display drive circuit includes capacitance predicting section for predicting a capacitance value each pixel will reach at one refresh cycle later when applying a predetermined voltage for targeted brightness, a frame buffer for storing the predicted capacitance value, and overdrive voltage calculating section for calculating a voltage to be applied to each pixel based on targeted brightness at one refresh cycle later and the stored capacitance value in frame buffer.
Abstract: A pointerless BDD package. A strict ordering is enforced on the BDD node identifiers and the advantageous consequences of that decision, such as a better memory locality of the nodes and faster unique table lookup, are reaped. The performance of a pointer based package appears to be exceeded, and reproducible results are attained across different platforms.
Abstract: A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. A system management framework monitors multiple sources of network packets within the distributed data processing system. After identifying a source of network packets that generates network packets that surpass a predetermined threshold limitation on small packet size, a system administrator is alerted to the identified source of network packets. At the discretion of the system administrator, execution of the identified source can be paused, stopped, or restarted.
Abstract: Systems and methods for instance counting and for the identification of a temporal pattern in an event sequence. The system addresses the use of “earliest-first” and “no-reuse” policies as criteria for the correctness of counting. The system also achieves higher performance than conventional methods by utilizing incremental computation.
Type:
Application
Filed:
May 17, 2001
Publication date:
November 21, 2002
Applicant:
IBM Corporation
Inventors:
Joseph L. Hellerstein, Sheng Ma, Chang-Shing Perng
Abstract: JP920010105US125 A liquid crystal display driver for applying a voltage to liquid crystal cells forming an image display area includes a pulse generation circuit for generating a plurality of reference pulses in which pulse generation densities are weighted, a pulse select/synthesis circuit for generating a pulse string by selecting and synthesizing necessary reference pulses on the basis of digital input data and the reference pulses and an integration circuit (low pass filter) for integrating the pulse string generated by the pulse select/synthesis circuit to output an analog voltage for gamma correction.
Abstract: A liquid crystal display device includes a substantially transparent substrate layer between a grating layer and a pixel electrode that comprises a solid conductor and an electrically conductive mesh. The device also includes a liquid crystal layer between said pixel electrode and a substantially transparent counter electrode that is arranged at a transparent cover plate. It further includes an active circuit element layer with a field effect transistor for controlling the pixel electrode. A method for manufacturing the liquid crystal display device is further disclosed wherein the pixel electrode is formed by printing a patterned substance onto the substrate layer and selectively plating a conductor onto said substance. The device may also comprise a conductor mesh comprising rows of conductor lines crossing with columns of conductor lines, wherein at least part of the conductor lines are randomly spaced from each other.
Type:
Application
Filed:
May 13, 2002
Publication date:
November 14, 2002
Applicant:
IBM
Inventors:
Alexander Bietsch, Emmanuel Delamarche, Bruno Michel, Heinz Schmid
Abstract: A improved method of making of silicon on sapphire structure and/or device is disclosed. In a first preferred embodiment, a single silicon oxide layer is placed between the silicon layer and the sapphire layer. This can be done by attaching the silicon oxide layer on the silicon layer, e.g. by growing or depositing, and then attaching the sapphire layer to the oxide layer using wafer bonding. In an alternative embodiment, a first silicon oxide layer is attached to the silicon layer, e.g. by growing or depositing. A second silicon oxide layer is then attached to the sapphire layer, e.g. by depositing. Then the first and second silicon oxide layers are attached by a wafer bonding technique.
Type:
Application
Filed:
May 9, 2001
Publication date:
November 14, 2002
Applicant:
IBM
Inventors:
Louis L. Hsu, Leathen Shi, Li-Kong Wang
Abstract: A method for providing a maintenance environment for computer program code is disclosed. According to the method, portions of the computer program code are selectively stored and one or more lists of the stored portions are created. Links are created between the lists and the stored portions of the computer program code for navigational purposes. A system for providing a maintenance environment for computer program code and a computer program product for the same purpose are also disclosed.
Abstract: A method, apparatus, and article of manufacture for optimizing a query being performed by a computer system to retrieve data from a database stored on the computer system. The query is analyzed to identify any joins therein that are lossless and to identify any tables of the identified joins that are eligible for removal. This analysis includes partitioning the joins into lossless and lossy joins, and partitioning the tables of the joins according to their associated quantifiers, wherein each of the quantifiers has a quantifier state indicating whether the table participates in a join that is lossless. The query is then rewritten to eliminate the identified tables that are eligible for removal.
Abstract: Automatic electronic bidding for goods or services. In one embodiment, the history of bids or asks is examined to determine which have resulted in trades within a prescribed span of time. This information plus, possibly, some additional auxiliary information is used to estimate, for one or more candidate prices within a prescribed range, the likelihood for a bid or ask at that price to result in a trade; an optimal price is selected using this set of bid/ask prices and trade probabilities plus additional information about privately held information about reservation prices, etc. to compute an optimal bid/ask price or modify an existing bid/ask; and the auctioneer is sent a message conveying the chosen new or modified optimal bid/ask price.
Type:
Application
Filed:
April 10, 2001
Publication date:
October 10, 2002
Applicant:
IBM Corporation
Inventors:
Rajarshi Das, James E. Hanson, Jeffrey O. Kephart, Gerald J. Tesauro
Abstract: The invention provides a file classification management system and method used in operating systems for managing the files by categories. Each of the physically stored files is mapped into one or more logical categories based on the contents of the file. And a desktop files resource manager presents the files by categories organized in a tree structure such that the user can directly find desired files via categories by using the present invention. The invention significantly improves the function of the file system and makes the file management interface more friendly.
Type:
Application
Filed:
March 27, 2002
Publication date:
October 3, 2002
Applicant:
IBM
Inventors:
Li Zhang, Liping Yang, Yue Pan, Dong Liu
Abstract: A lexical analyzer for processing computer programming languages is provided. The lexical analyzer can detect single character or multi-character delimiters, as well as single and/or multi-character delimiter-tokens included in an input stream. In response to detecting a delimiter, the lexical analyzer returns a token representing a string immediately preceding the delimiter in the input stream. Upon detecting a delimiter-token, the lexical analyzer stores the delimiter-token, and returns it on a subsequent call to the analyzer.
Abstract: A reference clock of frequency F is used to generate a quadrature clock at the same frequency F without generating frequencies higher than F. A multiphase voltage-controlled oscillator (MVCO) has a nominal frequency less than F is used in a feedback circuit with a multiple phase (MP) phase detector that which operates on the multiple phases of the MVCO. The multiple phases of the MVCO are sampled at and latched on both edges of the reference clock to generate phase detector outputs which are combined in combinational logic to generate Sync State outputs. The Sync State outputs are used in combination with the multiple phase outputs to generate an error signal with is operable to generate a control voltage which controls the frequency of the MVCO and to generate a shifted clock which is divided in a sequential circuit to generate the quadrature clock with a frequency F.
Type:
Application
Filed:
November 28, 2001
Publication date:
October 3, 2002
Applicant:
IBM Corporation
Inventors:
David William Boerstler, Robert Keven Montoye, Kevin John Nowka
Abstract: Building a data-driven text-to-speech system involves collecting a database of natural speech from which to train models or select segments for concatenation. Typically the speech in that database is produced by a single speaker. In this invention we include in our database speech from a multiplicity of speakers.
Abstract: Methods and apparatus, in the context of speech recognition, for compensating in the cepstral domain for the effect of an interfering signal by using a reference signal.
Abstract: A methodology is presented for a network single sign-on (SSO) authentication process using digital certificates. A user has access to protected resources, such as legacy applications, that require verification of a user's authentication data prior to providing access. The user's authentication data is encrypted using the public key of the user, and an attribute certificate containing the encrypted authentication data is generated by an attribute-certificate-issuing authority. When a user requires access to the protected resource, an SSO agent performs an initial authentication process against the user. The SSO agent then retrieves the user's attribute certificate, and for subsequent authentication requests for other protected resources, the SSO agent uses the authentication data from the attribute certificate that corresponds to the targeted protected resource.