IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140282604Abstract: Techniques are disclosed for qualified checkpointing of a data flow model having data flow operators and links connecting the data flow operators. A link of the data flow model is selected based on a set of checkpoint criteria. A checkpoint is generated for the selected link. The checkpoint is selected from different checkpoint types. The generated checkpoint is assigned to the selected link. The data flow model, having at least one link with no assigned checkpoint, is executed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric A. Jacobson, Yong Li, Shyam R. Mudambi, Xiaoyan Pu
-
Publication number: 20140279830Abstract: Approaches for data integration between multiple IT sources using automated data processing based on target metadata are provided. Specifically, an integration component is configured to load a mapped data set into a table with delta processing based on a configuration object containing, e.g., the source data location, target table name, and source to target mapping. The integration component uses the target metadata to validate data, identify changes, generate the necessary database programming language (e.g., structured query language (SQL)), and run the database programming language with data binding to perform the actual data updates. The integration component leverages the data target metadata to automate the processing of source data, thus providing a way to validate the data, and identify delta changes at the field level between the source and target. This significantly reduces the overall development effort, while providing consistency in record handling and error reporting.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gautam Majumdar, Tarun K. Saha, Michael Q. Wang
-
Publication number: 20140279828Abstract: A computational device receives input data and control data, where the control data includes instructions to modify one or more operations performed during a runtime execution associated with the input data. The control data is processed to modify the one or more operations during the runtime execution associated of the input data.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140281669Abstract: A method for network controller initialization that includes identifying a controller connected to a network as a primary controller that manages switches in the network. One or more other controllers connected to the network are identified as secondary controllers. A failover priority table is created. The failover table indicates an order that the one or more other controllers will replace the controller as the primary controller in the event that the controller enters a failure mode. The failover priority table is broadcast to the switches in the network.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Casimer DeCusatis, Rajaram B. Krishnamurthy
-
Publication number: 20140272687Abstract: Methods and structures for extreme ultraviolet (EUV) lithography are disclosed. A method includes determining a phase error correction for a defect in an EUV mask, determining an amplitude error correction for the EUV mask based on both the defect in the EUV mask and the phase error correction, and modifying the EUV mask with the determined phase error correction and the determined amplitude error correction.Type: ApplicationFiled: June 2, 2014Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Emily E. GALLAGHER, Gregory R. MCINTYRE, Alfred WAGNER
-
Publication number: 20140268463Abstract: Universal Serial Bus (USB) protection circuits are provided. A circuit includes a plurality of first transistors connected in series between a pad and ground. The circuit also includes a plurality of second transistors connected in series between the pad and a supply voltage. The circuit further includes a control circuit that applies respective bias voltages to each one of the plurality of first transistors and to each one of the plurality of second transistors. The bias voltages are configured to: turn off the plurality of first transistors and turn off the plurality of second transistors when a pad voltage of the pad is within a nominal voltage range; sequentially turn on the plurality of first transistors when the pad voltage increases above the nominal voltage range; and sequentially turn on the plurality of second transistors when the pad voltage decreases below the nominal voltage range.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Daniel M. DREPS
-
Publication number: 20140280619Abstract: Arrangements relate to the grouping electronic messages by a messaging client. A plurality of electronic messages to a message recipient from a sender electronic messaging system can be received. Each of the electronic messages can include a container specification, which can include an identifier assigned by the sender electronic messaging system. The identifiers of the received electronic messages can be compared. A plurality of the received electronic messages having the same identifier can be grouped. The grouped electronic messages can be presented as a single electronic message to the message recipient.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mustansir Banatwala, David A. Brooks, Joseph A. Russo
-
Publication number: 20140266819Abstract: Mechanisms are provided for the compact storage of geographical geometries as a collection of points, where individual points are encoded as binary/ternary strings (with the property that points closer to each other share a longer binary/ternary prefix) and the geometry is encoded by compressing the binary/ternary representation of common-prefix points. Mechanisms are also provided for the representation of a geometry using a ternary string that allows efficient storage of arbitrary shapes (e.g., long line segments, oblong polygons) as opposed to binary representations that are more efficient when the geometries are square or nearly square shaped.Type: ApplicationFiled: August 19, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Raghu Kiran Ganti, Mudhakar Srivatsa
-
Publication number: 20140281713Abstract: A hierarchical multi-stage model of asset failure risk for complex heterogeneously distributed physical assets is built. The hierarchical multi-stage model considers heterogeneity of failure patterns for the assets. At least one data stream is analyzed to determine whether the hierarchical multi-stage model needs to be updated due to a change in the failure patterns. If the analysis indicates that the hierarchical multi-stage model needs to be updated, the hierarchical multi-stage model is dynamically updated to obtain an updated hierarchical multi-stage model.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Arun Hampapur, Hongfei Li, Zhiguo Li, Yada Zhu
-
Publication number: 20140281192Abstract: Embodiments relate to tagging in a MCU. An aspect includes assigning a command tag to a command by a tag allocation logic of the MCU. Another aspect includes sending the command and the command tag on a plurality of channels that are in communication with the MCU. Another aspect includes receiving a response tag comprising one of a data tag and a done tag corresponding to the command tag from each of the plurality of channels. Another aspect includes, based on receiving a data tag from each of the plurality of channels, determining that read data corresponding to the command is available.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Glenn D. Gilda, Mark R. Hodges, Vesselina K. Papazova, Eric E. Retter
-
Publication number: 20140282388Abstract: A program code execution is monitored. Variable type and value information the one or more variables in the program code take during the execution of the program code are stored, and compiled over multiple execution of the program code as historical run-time execution traces. A code editor user interface may present the historical run-time execution traces for inspection, whether or not the program code is currently executing. Statistical properties associated with the variable type and value information may be computed. Future variable type and value the one or more variables might take during future execution of the program code may be predicted.Type: ApplicationFiled: August 9, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Peter K. Malkin, Jacquelyn A. Martino, Clifford A. Pickover, Danny Soroker, Justin D. Weisz
-
Publication number: 20140281330Abstract: A method of managing resource allocations in a storage system provisioning system, including monitoring write applications that result in new storage block allocations during a current time slice, calculating a time remaining to exceed actual capacity of allocated storage blocks, if the calculated remaining time does exceed length of next time slice immediately transmitting an alert when an estimated number of future write requests exceeds a predetermined threshold, and if the calculated remaining time does exceed length of next time slice immediately transmitting an alert when an estimated number of future write requests exceeds a predetermined threshold, wherein a duration of a time slice is set by a storage system administrator based upon a current storage library setup and a time required to arrange a new storage device when a thin provisioning device is going out of disk space.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140277602Abstract: A method, system and apparatus for operating an energy-using device are disclosed. Current data related to operation of the energy-using device is received at a remote device. An operating specification for the energy-using device is received at the remote device from a database. A recommended setting of the energy-using device is determined from the current data and the operating specification. The remote device communicates the recommended setting to the energy-using device. A control unit at the energy-using device receives the recommended setting and implements the recommended setting at the energy-using device.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary S. Ditlow, Brian P. Gaucher, Clifford A. Pickover, Jinjun Xiong
-
Publication number: 20140279885Abstract: Embodiments of the invention provide a method for data replication in a networking system comprising multiple computing nodes. The method comprises maintaining a data set on at least two computing nodes of the system. The method further comprises receiving a data update request for the data set, wherein the data update request includes a data update for the data set. The data set on the at least two computing nodes is updated based on the data update request received.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140280839Abstract: The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms.Type: ApplicationFiled: August 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Dakshi Agrawal, Bong Jun Ko, Thai Franck Le, Robert B. Nicholson, Vasileios Pappas, Dinesh C. Verma
-
Publication number: 20140280824Abstract: For efficient centralized stream initiation and retry control in a computing environment, using a centralized data streams management module for both managing when data streams should be opened and sent from a source location to a destination and for determining when to reattempt opening data streams sent from the source location to the destination after an nth number of consecutive failed attempts using an incrementing time calculation. The incrementing time calculation computes a dynamically calculated time period.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yariv BACHAR, Ron EDELSTEIN, Alon HOROWITZ, Oded SONIN
-
Publication number: 20140282506Abstract: Embodiments relate to a computer system comprising a service layer controller. The computer system comprises a ring interface unit configured to provide access to a host system that enables access to a plurality of virtual machines (VMs). The computer system comprises a hardware application configured to be encapsulated by the service layer controller such that the hardware application communicates to the host system via interfaces controlled by the ring interface unit and service layer controller.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Cadigan, Jr., Howard M. Haynie, Scot H. Rider, Mushfiq U. Saleheen, Donald W. Schmidt
-
Publication number: 20140278741Abstract: A method, system and software for using customer community analytics for: (i) discovering relationships (for example, financial transactional relationships) between customers and other entities (such as companies); (ii) representing the customers, other entities and their relationships in the form of a machine readable graph; and (iii) using the graph to perform graph-based functions. These functions may include: up-selling, cross-selling, making personalized recommendations, discovering a financial products supply chain and/or facilitating social interactions between and among customers and other entities.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vishal S. Batra, Raghuram Krishnapuram, Mukesh K. Mohania
-
Publication number: 20140282553Abstract: Techniques are disclosed to identify concurrently used applications based on application state. Upon determining that usage of a plurality of applications, including a first state of a first application of the plurality of applications, satisfies a criterion for identifying concurrently used applications, the plurality of applications is designated as a first meta-application having a uniquely identifiable set of concurrently used applications. The first meta-application has an associated criterion for launching the first meta-application. Upon determining that the criterion for launching the first meta-application is satisfied, at least one of the plurality of applications is programmatically invoked.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Adam T. Clark, John E. Petri
-
Publication number: 20140280547Abstract: A method for migrating virtual machines (VMs) that includes creating a temporary storage area. The temporary storage area is created by a controller in a network that is in a first state. The configuration data for a VM is stored in the temporary storage area. The network is provisioned from the first state to a second state. The provisioning is by the controller and based on network locations of a source server and a target server. A message is transmitted to the target server. The message includes a request to migrate the VM from the source server to the target server, and an address of the temporary storage area. It is determined that the migration has completed and the temporary storage area is removed based on the determining that the migrant has completed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Casimer DeCusatis, Rajaram B. Krishnamurthy
-
Publication number: 20140282072Abstract: Embodiments include a program for transferring of data from a source computer to a location on a target computer utilizing a drag-and-drop operation and a spring-loaded portal. I/O devices are monitored for mouse input that includes coordinates of a mouse pointer. Whether an end-user is utilizing the mouse pointer to perform the drag-and-drop operation is determined. The spring-loaded portal is expanded from a closed position to an open position. A screen snapshot image of the location on the target computer is retrieved and overlaid on the spring-loaded portal. The transferring of data from the source computer to the location on the target computer is executed, wherein the location on the target computer is previewable at the source computer through the spring-loaded portal. Whether to abort the transferring of data is determined. The spring-loaded portal is minimized from the open position to the closed position.Type: ApplicationFiled: May 28, 2014Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Anthony E. Martinez, Vanessa V. Michelini
-
Publication number: 20140279765Abstract: While at least one candidate solution of a first generation of candidate solutions remains to be evaluated in accordance with a fitness function for an optimization problem, a plurality of candidate solutions is selected from the first generation of candidate solutions to participate in a tournament. It is determined whether each of the plurality of candidate solutions selected to participate in the tournament have been evaluated in accordance with the fitness function. If all have been evaluated, then one or more winners of the tournament are selected from the plurality of candidate solutions of the first generation of candidate solutions. A candidate solution of a second generation of candidate solutions is created with the selected one or more winners of the tournament in accordance with a genetic operator.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Jason F. Cantin
-
Publication number: 20140269692Abstract: Techniques for transmitting a packet from a source switch module to a destination switch module. Embodiments retrieve path information specifying a route to the destination switch module. A packet is created that includes (i) at least a portion of the path information and (ii) a set of load/store operations to be executed by the destination switch module. Embodiments then transmit the packet to a first switch module using a first port, the first port specified in the retrieved path information. The first switch module is configured to transmit the packet based on the at least a portion of the path information in the packet, and the destination switch module is configured, upon receiving the packet, to copy the set of load/store operations into an execution buffer to be automatically executed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: William T. Flynn, Joseph A. Kirscht, Bruce M. Walk
-
Publication number: 20140281430Abstract: Execution of condition-based instructions is facilitated. A condition-based instruction is obtained, as well as a confidence level associated with the instruction. The confidence level is checked, and based on the confidence level being a first value, a predicted operation of the instruction, which is based on a predictor, is unconditionally performed. Further, based on the confidence level being a second value, a specified operation of the instruction, which is based on a determined condition, is conditionally performed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140279859Abstract: In one embodiment, a process includes determining a data node for a data record to be inserted and/or updated in an index structure of a record-oriented file system. A lock on the corresponding data node is created, and the data record in the corresponding data node is stored and/or updated. However, when the corresponding data node does not have free space sufficient to store and/or update the data record, the corresponding data node is split sequentially into two data nodes. The new data record is stored in one of the two data nodes. The process continues by creating a lock on and updating a parent node in a sequence set which includes information about the corresponding data node and any parent index nodes above the parent index node which are affected by splitting the parent index node.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Debra J. Benjamin-Deckert, Lawrence L. T. Law, Terri A. Menendez
-
Publication number: 20140264287Abstract: A coplanar waveguide device includes a coplanar waveguide structure disposed on a substrate, at least one qubit coupled to the coplanar waveguide structure and an add-on chip having a metallized trench, and disposed over the substrate.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140279968Abstract: A method, system, and computer program product to process data in a streaming application are disclosed. The method, system, and computer program product may include receiving a stream of tuples to be processed by a plurality of processing elements operating on a plurality of compute nodes. The method, system, and computer program product may determine whether a first processing element has additional processing capacity. In some embodiments, the method, system, and computer program product determine whether a second processing element, which receives its input from the first processing element, also has additional processing capacity. The method, system, and computer program product may employ compression at the first processing element if one of the first and the second processing element has additional processing capacity.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael J. Branson, John M. Santosuosso
-
Publication number: 20140270113Abstract: Embodiments of the invention provide a method, system and computer program product for voice print tagging for interactive voice response (IVR) session management. In an embodiment of the invention, a method of voiceprint tagging for IVR session management is provided. The method includes establishing an IVR session for a caller from over a network and presenting a portion of the IVR session to the caller over the network. The method also includes storing a voiceprint tag in memory associating a voiceprint of the caller with a portion of the IVR session. Finally, the method includes responding to a premature termination of the IVR session by re-establishing the prematurely terminated IVR session with the caller at the portion of the IVR session indicated by the voiceprint tag of the caller.Type: ApplicationFiled: October 22, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Victor S. Moore, David Nahamoo, Wendi L. Nusbickel, Christopher J. Vavra
-
Publication number: 20140282622Abstract: An indication that an event occurred is received from a processor by a dual outcome event monitoring unit. It is determined whether the event is associated with an increment event or a decrement event. In response to determining that the event is associated with the increment event, an event counter is incremented. The event counter is part of the dual outcome monitoring unit. In response to determining that the event is associated with the decrement event, the event counter is decremented.Type: ApplicationFiled: November 25, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Giles Roger Frazier, Venkat R. Indukuru
-
Publication number: 20140264497Abstract: A method for doping terminals of a field-effect transistor (FET), the FET including a drain region, a source region, and a surround gate surrounding a channel region, the method including depositing a dopant-containing layer, such that the surround gate prevents the dopant-containing layer from contacting the channel region of the FET, the dopant-containing layer including a dopant. The dopant then diffuses the dopant from the dopant-containing layer into at least one of the drain region and source region of the FET.Type: ApplicationFiled: September 25, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Chung H. Lam, Jing Li
-
Publication number: 20140264015Abstract: Systems and methods for performing X-ray Photoelectron Spectroscopy (XPS) measurements in a semiconductor environment are disclosed. A reference element peak is selected and tracked as part of the measurement process. Peak shift of the reference element peak, in electron volts (eV) is tracked and applied to other portions of acquired spectrum to compensate for the shift, which results from surface charge fluctuation.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Bing Sun, Min Dai, Srinivasan Rangarajan
-
Publication number: 20140264595Abstract: Various embodiments form strained and relaxed silicon and silicon germanium fins on a semiconductor wafer. In one embodiment a semiconductor wafer is formed. The semiconductor wafer comprises a substrate, a dielectric layer, and a strained silicon germanium (SiGe) layer. At least one region of the strained SiGe layer is transformed into a relaxed SiGe region. At least one strained SiGe fin is formed from a first strained SiGe region of the strained SiGe layer. At least one relaxed SiGe fin is formed from a first portion of the relaxed SiGe region. Relaxed silicon is epitaxially grown on a second strained SiGe region of the strained SiGe layer. Strained silicon is epitaxially grown on a second portion of the relaxed SiGe region. At least one relaxed silicon fin is formed from the relaxed silicon. At least one strained silicon fin is formed from the strained silicon.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140270455Abstract: Embodiments of the invention relate to a constructing a gene interaction network. Tools are provided to compute a gene relationship measure based upon cellular images, and to rank image collections having a similar morphology. The ranking is based upon capturing similarity within the ranked collection by modeling a three dimensional shape of a cellular image stack. The graph is constructed for related images stacks. Nodes in the graph represent genes, and edges drawn between the nodes represent corresponding image stacks in a commonly ranked list. Accordingly, the graphical representation mathematically and visually connects respective genes.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Arnon Amir, Tanveer Fathima Syeda-Mahmood
-
Publication number: 20140280117Abstract: Prioritizing items based on user activity includes determining a user interest based on a current user activity and prioritizing items in a list presented in a display based on the user interest.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Judith H. Bank, Liam Harpur, Ruthie D. Lyle, Patrick J. O'Sullivan, Lin Sun
-
Publication number: 20140264738Abstract: A semiconductor inductor structure may include a first spiral structure, located on a first metal layer, having a first outer-spiral electrically conductive track and a first inner-spiral electrically conductive track separated from the first outer-spiral electrically conductive track by a first dielectric material. A second spiral structure, located on a second metal layer, having a second outer-spiral electrically conductive track and a second inner-spiral electrically conductive track separated from the second outer-spiral electrically conductive track by a second dielectric material may also be provided. The first outer-spiral electrically conductive track may be electrically coupled to the second outer-spiral electrically conductive track and the first inner-spiral electrically conductive track may be electrically coupled to the second inner-spiral electrically conductive track.Type: ApplicationFiled: June 3, 2014Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Robert L. Barry, Robert A. Groves, Venkata N.R. Vanukuru
-
Publication number: 20140282904Abstract: Delivering author specific content includes identifying author specific content with tags inserted into its metadata across multiple online resources and delivering updates about the author specific content to a user specified activity stream.Type: ApplicationFiled: November 8, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess, Jeffrey R. Hoy
-
Publication number: 20140279187Abstract: An approach to generate and execute an e-commerce gift offer for a social network contact as a function of integrating social network data into a web site offering goods or services for sale within a network computing environment is provided. In response to the user selecting an item offered for sale by the web site, aspects search personal data associated with the user that is acquired from a different, social network web site to determine an indication that another user listed within the acquired personal data has an interest in also acquiring the selected item, and present an offer to the user to select the item for an additional gift purchase for such other user as a recipient. Further aspects use the acquired personal data to narrow down retailers to those that provide delivery service to a current residence of the other user for execution of the gift purchase.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Divya Gopinath, Rajesh Radhakrishnan, Jennifer A. Watson
-
Publication number: 20140278690Abstract: Accommodating schedule variance in work, in one aspect, may comprise tracking information associated with work packets; identifying one or more work packets deviating from a planned schedule based on the tracking; identifying one or more features associated with the identified one or more work packets; computing metrics associated with the one or more features; prioritizing the identified one or more work packets based on the computed metrics using a predictive model, the predictive model calibrated at least based on historical data; and recommending one or more actions to take associated with the one or more prioritized work packets.Type: ApplicationFiled: September 17, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Shivali Agarwal, Yi-Min Chee, Juhnyoung Lee, Rong Liu, Vinay K. Reddy, Renuka Sindhgatta, Lav R. Varshney, Jeaha Yang
-
Publication number: 20140279741Abstract: A method of meta-learning includes receiving a prediction objective, extracting a plurality of subsets of data from a distributed dataset, generating a plurality of local predictions, wherein each local prediction is based on a different subset of the plurality of subsets of data and the prediction objective, combining the plurality of local predictions, and generating a final prediction based on the combined local predictions.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Publication number: 20140264558Abstract: A faceted intrinsic buffer semiconductor material is deposited on sidewalls of a source trench and a drain trench by selective epitaxy. A facet adjoins each edge at which an outer sidewall of a gate spacer adjoins a sidewall of the source trench or the drain trench. A doped semiconductor material is subsequently deposited to fill the source trench and the drain trench. The doped semiconductor material can be deposited such that the facets of the intrinsic buffer semiconductor material are extended and inner sidewalls of the deposited doped semiconductor material merges in each of the source trench and the drain trench. The doped semiconductor material can subsequently grow upward. Faceted intrinsic buffer semiconductor material portions allow greater outdiffusion of dopants near faceted corners while suppressing diffusion of dopants in regions of uniform width, thereby suppressing short channel effects.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bhupesh Chandra, Paul Chang, Gregory G. Freeman, Dechao Guo, Judson R. Holt, Arvind Kumar, Timothy J. McArdle, Shreesh Narasimha, Viorel Ontalus, Sangameshwar Rao Saudari, Christopher D. Sheraw, Matthew W. Stoker
-
Publication number: 20140280204Abstract: A computer-implemented method, system and computer program product is provided for optimizing a document change or provenance scoring system by weighting sections of a document, scoring the changes for each section, and then combining the change scores for each section to generate an overall change score. An associated report may also be generated that catalogs all of the various scoring elements. The weighted score is stored in a document management system and provides a human document reviewer a level of detail to evaluate document changes. Accordingly, the weighted score reveals whether a document's changes require a brief or detailed review before the document's changes are approved for a next document version.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kenytt D. Avery, Edward L. Bader, Jean-Marc Costecalde, Chi M. Nguyen, Kevin N. Trinh
-
Publication number: 20140264600Abstract: A method of fabricating a semiconductor device is provided that includes providing a material stack that includes a silicon layer, a doped semiconductor layer, and an undoped silicon germanium layer. At least one fin structure is formed from the material stack by etching through the undoped silicon germanium layer, the doped semiconductor layer, and etching a portion of the silicon-containing layer. An isolation region is formed in contact with at least one end of the at least one fin structure. An anodization process removes the doped semiconductor layer of the at least one fin structure to provide a void. A dielectric layer is deposited to fill the void that is present between the silicon layer and the doped semiconductor layer. Source and drain regions are then formed on a channel portion of the at least one fin structure.Type: ApplicationFiled: September 17, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas N. Adam, Kangguo Cheng, Bruce B. Doris, Pouya Hashemi, Ali Khakifirooz, Alexander Reznicek
-
Publication number: 20140281461Abstract: Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. Subsequent to configuring the first computer, the first computer is power cycled, and upon the power cycling, the first computer loads the second boot image.Type: ApplicationFiled: November 7, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alex FRIEDMAN, Constantine GAVRILOV
-
Publication number: 20140278718Abstract: A set of to-do items may be obtained. A specified window of time may be received. A subset of the to-do items may be automatically prioritized as candidate tasks to be performed during the specified window of time. A prioritized subset of the to-do items may be presented. Based on one or more criteria, the mode of interaction with a user with respect to the to-do items may be in virtual universe.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Peter K. Malkin, Jacquelyn A. Martino, Clifford A. Pickover, Justin D. Weisz
-
Publication number: 20140264943Abstract: A semiconductor device and method of manufacture are provided. The semiconductor device may include a multiple-patterned layer which may include multiple channels defined by multiple masks. A width of a first channel may be smaller than a width of a second channel. A conductor in the first channel may have a conductor width substantially equivalent to a conductor width of a conductor in the second channel. A spacer dielectric on a channel side may be included. The method of manufacture includes establishing a signal conductor layer including channels defined masks where a first channel may have a first width smaller than a second width of a second channel, introducing a spacer dielectric on a channel side, introducing a first conductor in the first channel having a first conductor width, and introducing a second conductor in the second channel having a second conductor width substantially equivalent to the first conductor width.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David H. Allen, Douglas M Dewanz, David P. Paulsen, John E. Sheets, II, Kelly L. Williams
-
Publication number: 20140264341Abstract: Fabrication methods, device structures, and design structures for a bipolar junction transistor. A dielectric structure is formed that is coextensive with a single crystal semiconductor material of a substrate in an active device region. A semiconductor layer is formed that includes a single crystal section coupled with the active device region. The semiconductor layer has an edge that overlaps with a top surface of the dielectric structure. An intrinsic base layer is formed on the semiconductor layer.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renata Camillo-Castillo, David L. Harame, Vibhor Jain, Vikas K. Kaushal, Marwan H. Khater
-
Publication number: 20140279827Abstract: A method, system, and computer program product for managing time dimension tables are disclosed. In a first aspect, the method comprises providing an intelligent time dimension agent application and optimizing a time dimension table by the intelligent time dimension agent based upon changing data in associated fact tables. In a second aspect, the system comprises a processor and a memory coupled to the processor, wherein the memory includes an application which, when executed by the processor, causes the processor to carry out the steps of the method. In a third aspect, the computer program product comprises a non-transitory computer readable medium having a computer readable program recorded thereon, wherein the computer readable program, when executed on a computer device, causes the computer device to carry out the steps of the method.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Joseph P. Bigus, Leon Gong
-
Publication number: 20140267337Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.Type: ApplicationFiled: September 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140280372Abstract: According to one embodiment of the present invention, a system partitions data for parallel processing and comprises one or more computer systems with at least one processor. The system partitions data of a data object into a plurality of data partitions within a data structure based on a plurality of keys. The data structure includes a plurality of dimensions and each key is associated with a corresponding different dimension of the data structure. Portions of the data structure representing different data partitions are assigned to the computer systems for parallel processing, and the assigned data structure portions are processed in parallel to perform an operation. Embodiments of the present invention further include a method and computer program product for partitioning data for parallel processing in substantially the same manner described above.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew A. Huras, Sam S. Lightstone, Haider A. Rizvi
-
Publication number: 20140269418Abstract: In one embodiment, a method for providing virtual link aggregation (vLAG) in a transparent interconnection of lots of links (TRILL)-enabled network, includes creating a virtual routing bridge logically connected to a first physical routing bridge and a second physical routing bridge to form a vLAG group at an edge of the TRILL-enabled network; determining a first distribution tree linking the first physical routing bridge to every other routing bridge in the TRILL-enabled network in a non-repeating fashion, ending with the second physical routing bridge; determining a second distribution tree linking the second physical routing bridge to every other routing bridge in the TRILL-enabled network in a non-repeating fashion, ending with the first physical routing bridge; receiving a multicast packet at the virtual routing bridge from one of the physical routing bridges; and distributing the multicast packet according to either the first or the second distribution tree thereby preventing looping.Type: ApplicationFiled: October 25, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Meenakshi R. Kaushik, Chandramouli Radhakrishnan, Venkatesan Selvaraj, Daljeet Singh