Patents Assigned to International Business Machine Corporations
-
Publication number: 20040111607Abstract: A method and system is presented for configuring a group of OCSP (Online Certificate Status Protocol) responders so that they are highly available. Each of the grouped OCSP responders share a common public key. When responding to an OCSP request, an OCSP responder generates an OCSP response that is signed with a group digital signature; the certificate for the common or group public key can be attached to the OCSP response. An OCSP client uses the group public key to verify the group digital signature on an OCSP response from any of the OCSP responders. For an OCSP client, the availability of this group of responders is greater than the availability of any one member of the group.Type: ApplicationFiled: December 6, 2002Publication date: June 10, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Krishna K. Yellepeddy
-
Publication number: 20040111432Abstract: An apparatus and method for analyzing multimedia content to identify the presence of audio, visual and textual cues that together correspond to one or more high-level semantics are provided. The apparatus and method make use of one or more analysis models that are trained to analyze audio, visual and textual portions of multimedia content to generate scores associated with the audio, visual and textual portions with respect to various high-level semantic concepts. These scores are used to generate a vector of scores. The apparatus is trained with regard to relationships between audio, visual and textual scores to thereby take the vector of scores generated for the multimedia content and classify the multimedia content into one or more high-level semantic concepts. Based on the scores for the various audio, video and textual portions of the multimedia content, a level of certainty regarding the high-level semantic concepts may be generated.Type: ApplicationFiled: December 10, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Hugh William Adams, Giridharan Iyengar, Ching-Yung Lin, Milind R. Naphade, Chalapathy Venkata Neti, Harriet Jane Nock, John Richard Smith, Belle L. Tseng
-
Publication number: 20040111546Abstract: The present invention provides a data access ring. The data access ring has a plurality of attached processor units (APUs) and a local store associated with each APU. The data access ring has a data command ring, coupled to the plurality of APUs. The data command ring is employable to carry indicia of a selection of one of the plurality of APUs to the APUs. The data access ring also has a data address ring, coupled to the plurality of APUs. The data address ring is further employable to carry indicia of a memory location to the selected APU a predetermined number of clock cycles after the data command ring carries the indicia of the selection of one of the plurality of APUs. The data access ring also has a data transfer ring, coupled to the plurality of APUs. The data transfer ring is employable to transfer data to or from the memory location associated with the APU a predetermined number of clock cycles after the data address ring carries the indicia of the memory location to the selected APU.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Sang Hoo Dhong, Harm Peter Hofstee, John Samuel Liberty, Peichun Peter Liu
-
Publication number: 20040111635Abstract: An information processing system for protecting against denial of service attacks comprises an interface (310) to receive and send packets, wherein the packets comprise at least one synchronization packet that is part of a handshake process for establishing the connection between the source client computer (118) and the target server computer (102); a crypto engine (306) adapted to create a unique sequence number for inclusion in a packet to be sent to a client (118) requesting establishment of a connection between a client (118) and server (102), wherein the crypto engine (306) is further adapted to validate unique sequence numbers in received synchronization packets that are part of a handshake process for establishing the connection between the source client (118) and the protected server (102); and a lookup table (304) for storing information defining established connections between the server (102) and clients so that arriving packets that purport to be part of an established connection can be validatedType: ApplicationFiled: December 4, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Richard Harold Boivie, Jun Tung Fong
-
Publication number: 20040111414Abstract: A selective execution system allows a user to grant a lesser authority to individuals for normal use, but allow them the ability to use a higher level of authority while completing dependent object redefinition. The present system grants the limited ability to recreate dropped objects or views without allowing the user to redefine the object or view. A modification detection code (MDC) is generated for each statement in the tables and dependent views and written to the electronic media. Each party or program along the execution path can read the statement and validate its integrity by regenerating a MDC for the statement and comparing it to the original. If the MDCs match, the statement's integrity is assured and processing can take place accordingly. If the MDCs do not match, alternative processing can take place. Just prior to an statement's execution, the MDC comparison is made to ensure the statement is unaltered and can be processed as desired, such as with the higher authority.Type: ApplicationFiled: December 6, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Roy James Cornford, Tom Ulveman Jensen
-
Publication number: 20040111514Abstract: Techniques are disclosed for programmatically allocating memory among competing services in a distributed computing environment. Characteristics of web request streams and formulas for cache hit rates and client response times are used to create an objective function for memory allocation, such that maximum benefit can be realized from the memory allocations. When a particular service is allocated more memory, it can store more of its objects in cache, which improves client response time. Optionally, information from service level agreements may be used as input to the memory allocation computations.Type: ApplicationFiled: December 10, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Jeffrey S. Chase, Ronald P. Doyle
-
Publication number: 20040109410Abstract: Under the present invention, the performance of a set of system resources is monitored in response to incoming request traffic. When a system resource is approaching an overload condition, a corrective action is identified and implemented. Overload thresholds for each system resource and appropriate corrective actions are contained within a management policy. Based on a performance history of the corrective actions, the management policy can be changed/revised.Type: ApplicationFiled: December 10, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Jeffrey S. Chase, Ronald P. Doyle, David L. Kaminsky, David M. Ogle, Richard D. Telford
-
Publication number: 20040110351Abstract: A method of manufacturing a semiconductor device comprises implanting at an angle of about 20 to about 70 degrees a first halo dose of a dopant about a first portion of a perimeter of a source extension implant or a drain extension implant, wherein the first portion comprises a near channel region; and implanting at an angle of about 0 to about 20 degrees a second halo dose of the dopant about a second portion of the perimeter of the source extension implant or the drain extension implant, wherein the second portion is substantially free of the first portion, and wherein the angles are measured with respect to a vertical axis through the semiconductor device.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Shreesh Narasimha
-
Publication number: 20040110093Abstract: The present invention provides a substrate having thereon a patterned small molecule organic semiconductor layer. The present invention also provides a method and a system for the production of the substrate having thereon a patterned small molecule organic semiconductor layer. The substrate with the patterned small molecule organic semiconductor layer is prepared by exposing a region of a substrate having thereon a film of a precursor of a small organic molecule to energy from an energy source to convert the film of a precursor of a small organic molecule to a patterned small molecule organic semiconductor layer.Type: ApplicationFiled: December 9, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Ali Afzali-Ardakani, Hendrik F. Hamann, James A. Lacey, David R. Medeiros, Praveen Chaudhari, Robert J. Von Gutfeld
-
Publication number: 20040107770Abstract: A device for contacting and/or modifying a surface having a cantilever connected to an almost plane carrier element staying apart from said surface, said cantilever having a tip at its loose end being in close contact to said surface. It is proposed that the cantilever stand out of the plane of said carrier element. Further, a method for producing the cantilever having a tip at its loose end. The device is suitable for thermomechanical writing and thermal readout of binary information, lithographic and imaging techniques, and for surface modification.Type: ApplicationFiled: September 26, 2003Publication date: June 10, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michel Despont, Ute Drechsler, Mark I. Lutwyche, Hugo E. Rothuizen, Peter Vettiger
-
Publication number: 20040111254Abstract: A system, method and program product for storing relational tables wherein the tables comprises alternative messages according to a variant such as a national language. The relational tables further comprise at least a message key specifying a message and a variant key specifying a variant for selecting the appropriate message from the alternative messages. For example, the relational tables comprise language variant=1 for English and Variant=2 for French. An SQL query searches or sorts the list relational tables for entries appropriate for the language of interest. The relational table entries can be edited and new alternative messages are assigned a new message key according to a predetermined algorithm.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward D. Gogel, Michael Jen, Larry K. Klosterboer, Noah G. Sack
-
Publication number: 20040110380Abstract: CMP of integrated circuits containing DRAM arrays with trench capacitors fill the trenches with oxide, resulting in a an array of oxide structures that is dense compared with the concentration in the surrounding support structures and therefore has a higher loading. A conformal layer is deposited over the wafer, increasing the loading in the array, but filling in spaces between active areas. A blanket etch removes material in both the array and the supports. A block etch balances the amount of material in the array and the supports. A supplementary oxide deposition in the array fills spaces between the structures to a nearly uniform density.Type: ApplicationFiled: December 9, 2002Publication date: June 10, 2004Applicants: International Business Machines Corporation, Infineon Technologies North America Corp.Inventors: Jochen Beintner, Laertis Economikos, Michael Wise, Andreas Knorr
-
Publication number: 20040111464Abstract: A method of and a system for processing an enterprise application request on an end user application and an application server. This is accomplished by initiating the application request on the end user application in a first language (such as a markup language) with a first application program (such as a Web browser), and transmitting the application request to the server and converting the application from the first language of the first end user application to a language running on the application server, processing the application request on the application server, and transmitting the response from the application server back to the end user application, and converting the response from the language running on the application server to the language of the end user application.Type: ApplicationFiled: December 4, 2002Publication date: June 10, 2004Applicant: International Business Machine CorporationInventors: Shyh-Mei F. Ho, Tony Y. Tsai
-
Publication number: 20040111261Abstract: A speaker recognition technique is provided that can operate within the memory and processing constraints of existing portable computing devices. A smaller memory footprint and computational efficiency are achieved using single Gaussian models for each enrolled speaker. During enrollment, features are extracted from one or more enrollment utterances from each enrolled speaker, to generate a target speaker model based on a sample covariance matrix. During a recognition phase, features are extracted from one or more test utterances to generate a test utterance model that is also based on the sample covariance matrix. A sphericity ratio is computed that compares the test utterance model to the target speaker model, as well as a background model. The sphericity ratio indicates how similar test utterance speech is to the speech used when the user was enrolled, as represented by the target speaker model, and how dissimilar the test utterance speech is from the background model.Type: ApplicationFiled: December 10, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Upendra V. Chaudhari, Ganesh N. Ramaswamy, Ran Zilca
-
Publication number: 20040111264Abstract: A name entity extraction technique using language models is provided. A general language model is provided for the natural language understanding domain. A language model is also provided for each name entity. The name entity language models are added to the general language model. Each language model is considered a state. Probabilities are applied for each transition within a state and between each state. For each word in an utterance, the name extraction process determines a best current state and a best previous state. When the end of the utterance is reached, the process traces back to find the best path. Each series of words in a state other than the general language model state is identified as a name entity. A technique is provided to iteratively extract names and retrain the general language model until the probabilities do not change.Type: ApplicationFiled: December 10, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Zhong-Hua Wang, David Lubeneky
-
Publication number: 20040110394Abstract: The coating thickness and uniformity of spin-on deposition layers on semiconductor wafers is controlled through the in situ control of the viscosity and homogeneity of the mixture of precursor material and solvent material. The thickness of the deposited material is selected and the viscosity required at a given spin rate for the selected thickness is automatically mixed. Sensing and control apparatus are employed to ensure that the uniformity and viscosity required is maintained before dispensing onto said semiconductor wafer. Low-K dielectric materials of selected thickness are deposited in a uniform coating.Type: ApplicationFiled: December 9, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Edward Barth, John A. Fitzsimmons, Arthur W. Martin, Lee M. Nicholson
-
Publication number: 20040111413Abstract: A request is received from a user associated with the client and a transaction aging value is copied to a security aging value associated with the cached user security profile if the transaction aging value is specified with the user request. A decay time is calculated utilizing a profile refresh time stamp associated with the cached user security profile and a system clock. The cached user security profile is then refreshed if a refresh event occurs.Type: ApplicationFiled: December 4, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Getachew G. Birbo, Joyce Yuan-Sheng Hsiao, Sandra L. Sherrill, Andrew D. Tollerud, Yoshinobu Ueno, Jack Chiu-Chiu Yuan, James E. Zimmer
-
Publication number: 20040111668Abstract: Embodiments of the present invention generally provide a system, method and article of manufacture for validating annotations describing one or more portions of a data object. In general, prior to displaying a requested annotation, a current change detection value may be calculated from current data extracted from portions of the data object described by the annotation. The current change detection value may be compared to a previously saved change detection value calculated from data extracted from the portions of the data object at the time the annotation was generated. A mismatch in the current change detection value and the previously saved change detection value indicates a change in the annotated portions of the data object, which may render the annotation invalid. The annotated portions of the data object may be continuous or discontinuous.Type: ApplicationFiled: December 4, 2002Publication date: June 10, 2004Applicant: International Business Machines CorporationInventors: Brian J. Cragun, William C. Rapp
-
Patent number: 6748540Abstract: A method and apparatus for identifying unauthorized attempts to access a data processing system. A file used to contain data on failed attempts to access the data processing system is monitored. Responsive to the file containing data on failed attempts to access the data processing system, the data is analyzed to identify candidates for unauthorized access attempts.Type: GrantFiled: June 17, 1999Date of Patent: June 8, 2004Assignee: International Business Machines CorporationInventors: Christopher Lawrence Canestaro, Rick A. Hamilton, II, John Steven Langford, Maulin Ishwarbhai Patel
-
Patent number: 6747845Abstract: At least one modified strain region having a damage depth between 0.1 and 2 microns in a disk drive slider is created by implantation with ions, electrons or neutral atoms. The modified strain region induces a deformation of the disk drive slider. The nature and extent of this deformation is determined by the interaction between the slider and the modified strain region.Type: GrantFiled: October 11, 2000Date of Patent: June 8, 2004Assignee: International Business Machines CorporationInventors: John Edward Eric Baglin, Richard D. Bunch, Linden James Crawforth, Eric W. Flint, Andrew J. Kellock, Timothy Clark Reiley