IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120198270Abstract: In some example embodiments, there is a method for failback to a primary communications adapter. The method includes receiving, in a driver for the primary communications adapter and a backup communications adapter, a link up event for the primary communications adapter, wherein the link up event is sent from the primary communications adapter to the driver, and wherein the link up event is triggered by establishing electrical connectivity to the primary communications adapter. The method includes inferring that the primary communications adapter is configured for receiving packets. The method includes setting the backup communications adapter to idle, wherein the backup communications adapter receives packets and drops the packets while idle. The method includes activating the primary communications adapter, wherein the primary communications adapter receives packets and passes the packets up a protocol stack while activated.Type: ApplicationFiled: April 12, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Vinit Jain, Jorge Rafael Nogueras
-
Publication number: 20120198423Abstract: Methods, systems, and products are provided for code path tracking. Embodiments include identifying an instrumented trace point in software code to be path tracked; identifying a function executed at the instrumented trace point in the software code; identifying parameters for the function executed at the instrumented trace point; and recording a description of the function, the parameters, and the result of the execution of the function using the parameters.Type: ApplicationFiled: April 10, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Robert J. BESTGEN, Robert D. DRIESCH, JR., Wei HU, Shantan KETHIREDDY, Edward J. MILLER, Andrew P. PASSE, Ulrich THIEMANN
-
Publication number: 20120198478Abstract: An event notification method for distributed processing systems provides remote and local node event notification in systems that require local registration of an event consumer in order produce an event notifications. To provide notification of an event occurring on a remote node, either event consumers on all nodes in the cluster register locally to receive event notifications and specify that the event is a cluster event, in which case the nodes send notification of their locally-occurring events to all nodes, or remote registrations are accepted at nodes and if a local consumer for the event is not present, a listener thread registers as an event consumer. The listener thread sends the event notifications to the remote nodes registered as consumers for the event by observing communication between the event producer and the local consumer, or receiving the event notifications directly if there is no local consumer.Type: ApplicationFiled: March 22, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cheryl L. Jennings, Rajeev Mishra, Trishali Nayar, Lance W. Russell
-
Publication number: 20120198390Abstract: This disclosure relates to tools for optimizing complex processes or systems, such as flow process charts and, more specifically to the automatic graphical renderings of processes. In an exemplary embodiment, the process is a complex process including hundreds or thousands of operations. In an exemplary embodiment, a device displays a first view that includes a complete progression diagram automatically generated from data stored in a database, and at least some directional lines of the complete progression diagram unintelligibly overlap. In response to a selection of a particular operation in the complete progression diagram, in an exemplary embodiment, the display toggles to a second view that includes a focus diagram. In an exemplary embodiment, an edit to the focus diagram is checked in real-time and rejected if the edit orphans of an object currently undergoing the process on a live production line.Type: ApplicationFiled: January 31, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James M. Bogusky, Mary Ann Emmett, Donald A. Hallock, Arden Steuart Lake, Joseph Paul Palmeri, James I. Paradies, William Madison Sipperley
-
Publication number: 20120197628Abstract: Embodiments of the present invention provide a method, system and computer program product for multi-lingual support during spell checking of a block of text. In an embodiment of the invention, a method for multi-lingual spell checking of a block of text is provided. The method includes spell checking text of a source language such as a word in a source language in a block of text of the source language in a computer program executing in memory of a host computer. The method further includes locating suggested correctly spelled text for the spell checked text in a dictionary for the source language. The method yet further includes translating the located suggested correctly spelled text into a translation of the located suggested correctly spelled text in a secondary language.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Steven F. Best, Stanley K. Jerrard-Dunne, Janice M. Girouard, Timothy B. Snow
-
Publication number: 20120196401Abstract: Techniques for fabricating nanowire/microwire-based solar cells are provided. In one, a method for fabricating a solar cell is provided. The method includes the following steps. A doped substrate is provided. A monolayer of spheres is deposited onto the substrate. The spheres include nanospheres, microspheres or a combination thereof. The spheres are trimmed to introduce space between individual spheres in the monolayer. The trimmed spheres are used as a mask to pattern wires in the substrate. The wires include nanowires, microwires or a combination thereof. A doped emitter layer is formed on the patterned wires. A top contact electrode is deposited over the emitter layer. A bottom contact electrode is deposited on a side of the substrate opposite the wires.Type: ApplicationFiled: April 12, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: William Graham, Supratik Guha, Oki Gunawan, George S. Tulevski, Kejia Wang, Ying Zhang
-
Publication number: 20120194236Abstract: A method and a phase locked loop (PLL) circuit for implementing enhanced locking capability with a wide range dynamic reference clock, and a design structure on which the subject circuit resides are provided. The PLL circuit includes a Voltage Controlled Oscillator (VCO) and a plurality of filter comparators receiving a differential filter VCO control voltage. The plurality of filter comparators comparing the differential filter VCO control voltage values, provides a respective gate enable signal responsive to the compared differential filter VCO control voltage values. A clock signal is applied to an up/down counter responsive to the respective gate enable signal and the wide range dynamic reference clock. The count values of the up/down counter are provided to the VCO to select a respective frequency range for the VCO.Type: ApplicationFiled: April 11, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joel T. Ficke, Grant P. Kesselring, James D. Strom
-
Publication number: 20120194992Abstract: A DIMM riser card that includes a PCB having a first edge, a second edge, and one or more faces. The first edge of the PCB is configured for insertion into a main board DIMM socket. The first edge includes electrical traces that electrically couple to a memory bus. The DIMM riser card includes an angled DIMM socket mounted on one face of the PCB, where the angled DIMM socket is configured to accept a DIMM at an angle not perpendicular to the PCB and electrically couple the DIMM to the memory bus. The DIMM riser card includes a straddle mount DIMM socket mounted on the second edge of the PCB. The straddle mount DIMM socket is configured to accept a DIMM and electrically couple the DIMM to the memory bus through the electrical traces on the first edge of the PCB.Type: ApplicationFiled: April 4, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Justin P. Bandholz, Brian M. Kerrigan, Edward J. McNulty, Pravin Patel, Peter R. Seidel, Philip L. Weinstein
-
Publication number: 20120197985Abstract: A selection of a menu command that identifies a selected area of a web page as containing undesirable content is detected using a user input device of a client computer system executing a web browser that loads source web content from a group of servers. In response to the detection of the selected menu command, an alternate Internet Protocol (IP) address is substituted for a hostname of a website that provided the undesirable content. The alternate IP address is selected based on a content substitution profile of the client computer system. Using the substituted alternate IP address in response to a content request that identifies the undesirable content, the web page is reloaded with substituted source web content received from a server accessed by the alternate IP address displayed in the selected area of the web page instead of displaying the undesirable content identified in the content request.Type: ApplicationFiled: April 4, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul F. McMahan, Fonda J. Daniels, Patrick R. Guido, Wesley J. Gyure, Kent F. Hayes, JR., Robert C. Leah
-
Publication number: 20120197999Abstract: Methods and arrangements for creating and building subcategories in a user-based voice application. User posts are appended to a category in a voice application and subdivision of the category is prompted upon satisfaction of a first condition. The category is designated as a parent category, and at least one subcategory nomination are solicited from users. User input is solicited on appending at least one nominated subcategory to the parent category, and a nominated subcategory is appended to the parent category upon satisfaction of a second condition. User input is solicited to reassign a user post from the parent category to at least one subcategory.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sheetal Agarwal, Anupam Jain, Arun Kumar, Amit Anil Nanavati, Nitendra Rajput
-
Publication number: 20120198076Abstract: Methods for migrating logical partitions. The method may include dynamically discovering a destination system for migration; remotely creating an environment on the destination system for accepting the runtime migration; and migrating a running logical partition from a source system to the destination system. The source system may be managed by a source management system and the destination system may be managed by a destination management system. Dynamically discovering the destination system for migration may comprise establishing a communications channel between the source management system and the destination management system; obtaining a list of candidate systems from the destination management system; and validating resources of at least one candidate system.Type: ApplicationFiled: March 27, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Srinivas Kancharla, Mallesh Lepakshaiah, Anbazhagan Mani, Uday Medisetty
-
Publication number: 20120193687Abstract: Embodiments of this invention provide a method to fabricate an electrical contact. The method includes providing a substrate of a compound Group III-V semiconductor material having at least one electrically conducting doped region adjacent to a surface of the substrate. The method further includes fabricating the electrical contact to the at least one electrically conducting doped region by depositing a single crystal layer of germanium over the surface of the substrate so as to at least partially overlie the at least one electrically conducting doped region, converting the single crystal layer of germanium into a layer of amorphous germanium by implanting a dopant, forming a metal layer over exposed surfaces of the amorphous germanium layer, and performing a metal-induced crystallization (MIC) process on the amorphous germanium layer having the overlying metal layer to convert the amorphous germanium layer to a crystalline germanium layer and to activate the implanted dopant.Type: ApplicationFiled: January 31, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Jeehwan Kim, Jin-Hong Park, Devendra Sadana, Kuen-Ting Shiu
-
Publication number: 20120198172Abstract: A mechanism is provided in a virtual machine monitor for providing cache partitioning in virtualized environments. The mechanism assigns a virtual identification (ID) to each virtual machine in the virtualized environment. The processing core stores the virtual ID of the virtual machine in a special register. The mechanism also creates an entry for the virtual machine in a partition table. The mechanism may partition a shared cache using a vertical (way) partition and/or a horizontal partition. The entry in the partition table includes a vertical partition control and a horizontal partition control. For each cache access, the virtual machine passes the virtual ID along with the address to the shared cache. If the cache access results in a miss, the shared cache uses the partition table to select a victim cache line for replacement.Type: ApplicationFiled: April 11, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Jiang Lin, Lixin Zhang
-
Publication number: 20120197849Abstract: A method, system and computer program product for retrieving information from a relational database using user defined facets in a faceted query may include receiving a faceted query and receiving at least one user defined facet group query. The method may also include filtering out facets in the faceted query that relate to metadata in the relational database. The method may additionally include associating each remaining facet in the faceted query with a corresponding user defined facet group query of the at least one user defined facet group query to provide a set of user defined facet groups. An SQL query may be generated for the faceted query using the set of user defined facet groups Information from the relational database may be retrieved responsive to the SQL query.Type: ApplicationFiled: January 31, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Deepak M. Srinivasa, Adarsh Ramamurthy, Samanvitha Kumar
-
Publication number: 20120197828Abstract: A data center includes at least one rack containing electronic devices, a data center air conditioning system (DCAC), and an environmental parameter monitoring system. At least one set of eligible environmental parameters is determined that satisfies the cooling demand of the at least one rack containing electronic devices. According to the at least one set of eligible environmental parameters and corresponding relationships between sets of setting parameters of the DCAC and corresponding sets of environmental parameters determined by an artificial neural network, plural sets of setting parameters of the DCAC are determined. A power consumption of the DCAC to which each set of setting parameters in the plural sets of setting parameters corresponds is obtained. A set of setting parameters for which the corresponding power consumption satisfies a predetermined condition for energy saving is selected and us to set the DCAC.Type: ApplicationFiled: January 25, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Ming Yi
-
Publication number: 20120197902Abstract: Methods and systems for optimizing the retrieval of data from multiple sources are described. A slot map including slots for the storage of data elements can be obtained. The data elements associated with the slots can be prioritized by weighting values with costs of retrieving the data elements from respective data sources. Each value can be associated with a different data element and can indicate a respective degree of importance of the associated data element. Further, the systems and methods can direct the retrieval of data elements from the respective data sources in an order in accordance with the priority of the data elements to optimize the quality of data obtainable within a critical time constraint. In addition, the retrieved data elements can be stored in corresponding slots on a storage medium.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Varun BHAGWAN, Tyrone W.A. GRANDISON, Daniel F. GRUHL
-
Publication number: 20120198422Abstract: An apparatus for cross-browser testing of a web application is disclosed, including: a first broker residing among a plurality of browsers for receiving information of a user action from a browser operated by a user among the plurality of browsers and for transmitting the information of the user action to other browsers so that the other browsers can execute the user action; a second broker residing between the plurality of browsers and the web application for receiving at least one web request generated by executing the user action from the plurality of browsers and for determining whether to be able to merge the at least one web request, so as to determine whether the plurality of browsers are compatible with the web application. An associated method is also provided.Type: ApplicationFiled: April 12, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dong Huang, Yang Li, Shao Feng Shi, Kai Ye, Deng Peng Zhou
-
Publication number: 20120197919Abstract: Access to a data element stored within a database object is controlled. A request is received from a user to perform an operation in relation to the database object, the operation including retrieval of information from the data element of the database object. Prior to retrieving information from the data element, a determination is made whether at least a portion of the information from the data element is subject to masking in accordance with an access policy. In response to determining that information from the data element is subject to masking, the request is modified to require that information from the data element be retrieved in a masked condition.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Yao Ching Chen, Curt L. Cotner, Gerald G. Kiernan, Irene Ching-Hua Liu, Claire W. McFeely, Walid Rjaibi, Timothy J. Vincent
-
Publication number: 20120197983Abstract: A method for reproducing a graphical user interface display includes, with a graphical user interface display reproduction system, extracting data from network traffic being sent from a server to a first client device, the network traffic including cacheable files used to create a graphical user interface display on the first client device, storing the cacheable file in a trace file associated with the first client device, and sending the cacheable file to a second client device in response to a request from the second client device.Type: ApplicationFiled: March 22, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hidenori Gohda, Masahiko Kosuda
-
Publication number: 20120198462Abstract: A scheduler receives at least one flexible reservation request for scheduling in a computing environment comprising consumable resources. The flexible reservation request specifies a duration and at least one required resource. The consumable resources comprise at least one machine resource and at least one floating resource. The scheduler creates a flexible job for the at least one flexible reservation request and places the flexible job in a prioritized job queue for scheduling, wherein the flexible job is prioritizes relative to at least one regular job in the prioritized job queue. The scheduler adds a reservation set to a waiting state for the at least one flexible reservation request.Type: ApplicationFiled: February 1, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: LINDA C. CHAM, ALEXANDER DRUYAN, WEI LI, KAILASH N. MARTHI, YUN T. XIANG
-
Publication number: 20120198424Abstract: Method for providing programming support to a debugger are disclosed. The method includes defining at least one debugger programming statement, and instructing the debugger to execute the at least one debugger programming statement which modifies a least a portion of the computer program during execution of the computer program without recompiling the computer program. The debugger may be instructed to execute the at least one debugger programming statement at a specified position of the computer program. The at least one debugger programming statement may include a delete instruction that instructs the debugger to prevent one or more programming statements at a specified position in the computer program from being executed. The debugger may be instructed to execute the at least one debugger programming statement instead of one or more programming statements at a specified position in the computer program without recompiling the computer program.Type: ApplicationFiled: March 27, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Madhusudanan Kandasamy, Vidya Ranganathan
-
Publication number: 20120196610Abstract: According to one aspect of the present disclosure, a method and technique for enabling wireless communications for multiple numbers or subscriber identities using a single transceiver is disclosed. The method includes, for a terminal device including a transceiver for wireless communications, determining whether the terminal device supports a plurality of subscriber identities. The method also includes, responsive to determining that the terminal device supports a plurality of subscriber identities, creating a plurality of recurrent time slots for a communication channel of the terminal device, allocating for each subscriber identity a respective time slot, and enabling wireless communications for the plurality of subscriber identities using the respective time slots via the transceiver.Type: ApplicationFiled: March 29, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sandeep K. Matada, Victor S. Moore, Dhandapani Shanmugam
-
Publication number: 20120198509Abstract: Systems and methods for managing video delivery to mobile device clients. Videos are assimilated for transmission to clients, a playout lead is estimated for each video and the videos are transmitted to the clients.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vijay Arya, Malolan Chetlur, Partha Dutta, Shivkumar Kalyanaraman, Anand Seetharam
-
Publication number: 20120197943Abstract: Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jorge D. ACUNA, Ezequiel CERVANTES, Nedzad TALJANOVIC
-
Publication number: 20120196423Abstract: A method includes providing a substrate having insulating layers thereon; forming a first trench in a first region of the substrate and a second trench in a second region of the substrate; thermally growing layers of oxide along the sides of the trenches; filling the first trench and the second trench with a polysilicon material, planarizing the polysilicon material, and creating a shallow trench isolation between the first region and the second region, wherein the step f) of creating the shallow trench isolation is performed only after the steps of d) filling and e) planarizing.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Narasimhulu Kanike, Mark R. Visokay, Oh-Jung Kwon
-
Publication number: 20120195208Abstract: A method of operating a packet parser in a computing system includes providing a configurable packet pointer by the packet parser, the packet pointer configured to index a configurable number of atomic parsing elements, the atomic parsing elements having a configurable size, in a data stream received by the computing system for extraction, wherein the indexed atomic parsing elements are non-contiguous in the data stream; and receiving the extracted indexed atomic parsing elements from the data stream by the packet parser.Type: ApplicationFiled: January 31, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Francois Abel, Jean Calvignac, Christoph Hagleitner, Jan van Lunteren, Fabrice Verplanken
-
Publication number: 20120197892Abstract: A computer system for evaluating cross-domain clusterability upon a target domain and a source domain. The cross-domain clusterability is calculated as a linear combination of a target clusterability and a source-target pair matchability, by use of a trade-off parameter that determines relative contribution of the target clusterability and the source-target pair matchability. The target clusterability quantifies how clusterable the target domain is. The source-target pair matchability is calculated as an average of a target-side matchability and a source-side matchability, which quantifies how well target centroids of the target domain are aligned with the source centroids and how well source centroids of the source domain are aligned with the target centroids, respectively.Type: ApplicationFiled: March 29, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: JEFFREY M. ACHTERMANN, INDRAJIT BHATTACHARYA, KEVIN W. ENGLISH, JR., SHANTANU R. GODBOLE, SACHINDRA JOSHI, ASHWIN SRINIVASAN, ASHISH VERMA
-
Publication number: 20120196480Abstract: The invention provides an electrical connection element made up of a metal wire that is an ellipse as a whole, two end portions of one axis of the ellipse forming an upper contact part and a lower contact part respectively, at least one retention part being formed at the middle part between the upper contact part and the lower contact part, the retention part being wider than other positions of the electrical connection element in at least one dimension. The invention also provides an electrical connector comprising: the above electrical connection element and a housing having at least one slot, wherein the upper contact part of each electrical connection element extends above the upper surface of the housing, the lower contact part of each electrical connection element extends below the lower surface of the housing, and the at least one retention part is embedded in the at least one slot. The above electrical connection element and electrical connector can provide stable connection performance.Type: ApplicationFiled: August 5, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventor: Jian Hua Hu
-
Publication number: 20120193014Abstract: Methods and systems for reinforcing the periphery of a semiconductor wafer bonded to a carrier are disclosed. In one embodiment, additional adhesive is applied to the semiconductor wafer prior to bonding. The additional adhesive seeps into a crevice between the carrier and wafer and provides reinforcement. In another embodiment, adhesive is applied to the crevice by a dispenser after the wafer is bonded to the glass carrier.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: SARAH H. KNICKERBOCKER, Jonathan H. Griffith
-
Publication number: 20120198406Abstract: An apparatus, program product and method facilitate the design of a multi-layer circuit arrangement incorporating a universal, standardized inter-layer interconnect in a multi-layer semiconductor stack to facilitate interconnection and communication between functional units disposed on a stack of semiconductor dies. Each circuit layer in the multi-layer semiconductor stack is required to include an inter-layer interface region that is disposed at substantially the same topographic location such that when the semiconductor dies upon which such circuit layers are disposed are arranged together in a stack, electrical conductors disposed within each semiconductor die are aligned with one another to provide an inter-layer bus that is oriented vertically, or transversely, with respect to the individual circuit layers.Type: ApplicationFiled: March 16, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald K. Bartley, Russell Dean Hoover, Charles Luther Johnson, Steven Paul VanderWiel, Patrick Ronald Varekamp
-
Publication number: 20120198188Abstract: To prevent loss of a data volume by unintended deletion, including various versions of the data volume, the data is preserved, and, when needed, is regenerated at a different volume address than that of the deleted volume. In a computer-implemented data storage system, a method responds to a received command to delete a volume of data identified by a volume address, preserving data of the volume prior to deletion, and generates a unique token associated with the volume and version of the volume as of the deletion. The unique token is communicated as associated with the received delete command. The method responds to a received command to regenerate the data of the deleted volume, generating a command to find the data identified by the unique token, and creating a new, different, volume address for the data of the preserved deleted volume, thereby keeping both volume versions.Type: ApplicationFiled: February 2, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: JUAN A. CORONADO, BETH A. PETERSON
-
Publication number: 20120197908Abstract: Apparatus to associate a table of contents (TOC) and headings. An input section inputs TOC data C and body data D. A search section seeks the maximum value of a score function S which indicates the likelihood of associations M between a TOC and headings. An output section outputs associations M which maximize the score function S. The score function S is the total of a first sum obtained by summing unigram scores u for all the TOC items, where the unigram score u evaluates the likelihood of association of TOC item with a heading candidate line independently, and a second sum obtained by summing bigram scores b for all pairs of TOC items, where the bigram score b evaluates the likelihood of associations of paired TOC items with heading candidate lines on the basis of a degree of commonality.Type: ApplicationFiled: January 27, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Yuya Unno
-
Publication number: 20120193712Abstract: A semiconductor device which includes fins of a semiconductor material formed on a semiconductor substrate and then a gate electrode formed over and in contact with the fins. An insulator layer is deposited over the gate electrode and the fins. A trench opening is then etched in the insulator layer. The trench opening exposes the fins and extends between the fins. The fins are then silicided through the trench opening. Then, the trench opening is filled with a metal in contact with the silicided fins to form a local interconnect connecting the fins.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Andres Bryant, Huiming Bu, Dechao Guo, Wilfried E. Haensch, Chun-Chen Yeh
-
Publication number: 20120193603Abstract: A semiconductor-carbon alloy layer is formed on the surface of a semiconductor substrate, which may be a commercially available semiconductor substrate such as a silicon substrate. The semiconductor-carbon alloy layer is converted into at least one graphene layer during a high temperature anneal, during which the semiconductor material on the surface of the semiconductor-carbon alloy layer is evaporated selective to the carbon atoms. As the semiconductor atoms are selectively removed and the carbon concentration on the surface of the semiconductor-carbon alloy layer increases, the remaining carbon atoms in the top layers of the semiconductor-carbon alloy layer coalesce to form a graphene layer having at least one graphene monolayer. Thus, a graphene layer may be provided on a commercially available semiconductor substrate having a diameter of 200 mm or 300 mm.Type: ApplicationFiled: April 10, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jack O. Chu, Christos D. Dimitrakopoulos, Alfred Grill, Chun-yung Sung
-
Publication number: 20120193729Abstract: Devices and methods for device fabrication include forming a gate structure with a sacrificial material. Silicided regions are formed on source/drain regions adjacent to the gate structure or formed at the bottom of trench contacts within source/drain areas. The source/drain regions or the silicided regions are processed to build resistance to subsequent thermal processing and adjust Schottky barrier height and thus reduce contact resistance. Metal contacts are formed in contact with the silicided regions. The sacrificial material is removed and replaced with a replacement conductor.Type: ApplicationFiled: January 31, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: TAKASHI ANDO, Christian Lavoie, Vijay Narayanan
-
Publication number: 20120193747Abstract: Disclosed are embodiments of a Schottky barrier diode. This diode can be formed in a semiconductor substrate having a doped region with a first conductivity type. A trench isolation structure can laterally surround a section of the doped region at the top surface of the substrate. A semiconductor layer can be positioned on the top surface of the substrate. This semiconductor layer can have a Schottky barrier portion over the defined section of the doped region and a guardring portion over the trench isolation structure laterally surrounding the Schottky barrier portion. The Schottky barrier portion can have the first conductivity type and the guarding portion can have a second conductivity type different from the first conductivity type. A metal silicide layer can overlie the semiconductor layer. Also disclosed are embodiments of a method of forming this Schottky barrier diode and of a design structure for the Schottky barrier diode.Type: ApplicationFiled: February 2, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Robert M. Rassel, Mark E. Stidham
-
Publication number: 20120197918Abstract: Some embodiments of the inventive subject matter are directed to detecting a request, from an application for a first instance of an operating system (OS) running a first version of the OS, to access a symbol via a special file that accesses kernel memory directly. A second instance of the OS, which manages the first OS, receives the request. The second instance of the OS runs a second version of the OS and includes a kernel shared between the first and second instances of the OS. Some embodiments are further directed to detecting data associated with the symbol, where the data is in a first data format that is compatible with the second version of the OS but incompatible with the first version of the OS and reformatting the data from the first data format to a second data format compatible with the second version of the OS.Type: ApplicationFiled: April 13, 2012Publication date: August 2, 2012Applicant: International Business Machines CorporationInventors: Luke M. Browning, Mallesh K. Lepakshaiah, Kavitha Ramalingam
-
Publication number: 20120197804Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar may create a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information may be recorded in a repository that is external from the product.Type: ApplicationFiled: April 8, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20120198187Abstract: Techniques for preserving memory affinity in a computer system is disclosed. In response to a request for memory access to a page within a memory affinity domain, a determination is made if the request is initiated by a processor associated with the memory affinity domain. If the request is not initiated by a processor associated with the memory affinity domain, a determination is made if there is a page ID match with an entry within a page migration tracking module associated with the memory affinity domain. If there is no page ID match, an entry is selected within the page migration tracking module to be updated with a new page ID and a new memory affinity ID. If there is a page ID match, then another determination is made whether or not there is a memory affinity ID match with the entry with the page ID field match. If there is no memory affinity ID match, the entry is updated with a new memory affinity ID; and if there is a memory affinity ID match, an access counter of the entry is incremented.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mathew Accapadi, Robert H. Bell, JR., Men-Chow Chiang, Hong L. Hua
-
Publication number: 20120198555Abstract: Systems, methods, and computer program products are disclosed for testing web service-related elements, where the instructions of a web service-related element are statically analyzed to identify a characteristic of an output of the web service-related element, and where it is determined from a received response to a web service request that the web service request was processed by the web service-related element if at least a portion of the response matches the characteristic of the output of the web service-related element.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Evgeny BESKROVNY, Omer TRIPP
-
Publication number: 20120197423Abstract: A method and apparatus includes determining a number of planned starts of a product during a predetermined time period for future processing, averaging the number of planned starts for the predetermined time period, and setting a production rate for a first range based on the average number of planned starts.Type: ApplicationFiled: April 13, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard G. BURDA, Aseem K. JOSHI, Sameer T. SHIKALGAR, Susan Kangas VAN OSS, Patrick R. VAREKAMP
-
Publication number: 20120198448Abstract: A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host.Type: ApplicationFiled: March 29, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ezequiel Cervantes, David Joseph Gimpl, Elfred Pagan, Sudhir Gurunandan Rao, Murali Krishna Somarouthu
-
Publication number: 20120198327Abstract: A computer implemented method, a computer program product, and a data processing system attach audio generated scripts to graphical representations of applications. A mobile device records an audio instruction. The mobile device then converts the audio instruction into a command script and associates the command script with a document identifier. The mobile device then forwards the document identifier and the associated command script to a target location. The command script can then be utilized at the target location to make changes to a document identified by the document identifier.Type: ApplicationFiled: April 6, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lloyd W. Allen, JR., Jana Helton Jenkins, Steven Michael Miller
-
CORRECTING MEMORY DEVICE AND MEMORY CHANNEL FAILURES IN THE PRESENCE OF KNOWN MEMORY DEVICE FAILURES
Publication number: 20120198309Abstract: Correcting memory device (chip) and memory channel failures in the presence of known memory device failures. A memory channel failure is located and corrected, or alternatively up to c chip failures are corrected and up to d chip failures are detected in the presence of up to u chips that are marked as suspect. A first stage of decoding is performed that results in recovering an estimate of correctable errors affecting the data or in declaring an uncorrectable error state. When an uncorrectable error state is declared, a second stage of decoding is performed to attempt to correct u erasures and a channel error in M iterations where the channel location is changed in each iteration. A correctable error is declared in response to exactly one of the M iterations being successful.Type: ApplicationFiled: January 29, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Luiz C. Alves, Luis A. Lastras-Montano, Patrick J. Meaney, Eldee Stephens, Barry M. Trager -
Publication number: 20120198482Abstract: A method, including arranging multiple digital information devices having respective memories to communicate within a network, and assigning within each of a subset of the respective memories a respective memory region dedicated only to management of a respective subgroup of the multiple devices, the subset and the subgroup each having a cardinality of at least two. The multiple digital information devices are then managed by exchanging information stored in the respective memory regions among the digital information devices over the network.Type: ApplicationFiled: January 27, 2011Publication date: August 2, 2012Applicant: International Business Machines CorporationInventor: Arnon Henn Klein
-
Publication number: 20120198427Abstract: A compiler compiles code in a target program by reserving at least one register for use by a dynamic binary optimizer during target program execution. When the target program is subsequently executed, the dynamic binary optimizer stores needed state information in the reserved register(s), without affecting register state of the target program. Preferably, the state information in the reserved register(s) includes addressing information for a context save area, used for saving processor state when switching context from the target program to the dynamic binary optimizer.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: William J. Schmidt
-
Publication number: 20120191867Abstract: A connection accepting system, an accepting server, and a connection-acceptance managing method, for reducing the processing load of a server and allowing connection to the server in the order of arrival of connection requests. An accepting server accepts a connection request to an application server made from a client terminal through a network. The accepting server issues a reference number to the client terminal at the time of receiving a first connection request, and manages a connection priority for connection to the application server, based on the reference number. The accepting server transmits a program for automatically executing a connection request again after a predetermined time period, at the time of issuing the reference number to the client terminal.Type: ApplicationFiled: March 30, 2012Publication date: July 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Katsuya Tsunogai
-
Publication number: 20120188665Abstract: In one general embodiment, a system includes a module having multiple transducers; and a sizing mechanism for actively applying a force to at least one lateral side of the module for selectively compressing the module, thereby adjusting a pitch between the transducers, wherein the lateral side of the module intersects an axis of the module oriented parallel to the direction of the force. Additional systems and methods are also presented.Type: ApplicationFiled: January 20, 2011Publication date: July 26, 2012Applicant: International Business Machines CorporationInventors: Robert G. Biskeborn, Calvin S. Lo, Gary M. McClelland
-
Publication number: 20120191234Abstract: Solutions for diagnosing in-line critical dimension control adjustments in a lithographic process are disclosed. In one embodiment, a method includes: locating a control structure in a data set representing one of a chip or a kerf; simulating component dimensions within a region proximate to the control structure; determining a difference between the simulated component dimensions within the region and target component dimensions within the region; determining whether the difference exceeds a predetermined tolerance threshold; adjusting a simulation condition in response to determining the difference exceeds the predetermined tolerance threshold; and repeating the simulating of the component dimensions within the region, the determining of the difference, and the determining of whether the difference exceeds the predetermined tolerance threshold in response to the adjusting of the simulation condition.Type: ApplicationFiled: January 26, 2011Publication date: July 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James A. Bruce, Kenneth T. Settlemyer, JR.
-
Publication number: 20120192207Abstract: Support sharing resources in a computer system. An operating system within the computer system, the operating system having a kernel level and a user level with the kernel level configured with a first container and a second container. The first container is assigned to a first namespace and the second container is assigned to a second namespace. Both the first and second namespaces are isolated from each other and at the same time in communication with at least one shared object. Communication across the containers is created through a socket in the namespace of the shared object of one or both of the containers. In addition, a conduit is formed between the containers by connecting the container absent the created socket to the container with the socket.Type: ApplicationFiled: March 26, 2012Publication date: July 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Vivek Kashyap