IBM Patent Applications
IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120155821Abstract: A polymer waveguide including a polymer matrix and particles, wherein the particles are embedded in the polymer matrix and have lower optical bulk losses than the polymer matrix.Type: ApplicationFiled: December 6, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger F. Dangel, Thilo H. Stoeferle, Jonas R. Weiss
-
Publication number: 20120159418Abstract: A task-based multi-process design synthesis methodology relies on a plurality of child processes to assist a parent process in performing optimizations on an integrated circuit design. Objects from an integrated circuit design are grouped into subsets and assigned to child processes, with each child process performing a transform on each of the objects in the subset assigned to that child process and determining which of the objects in the subset are candidate objects for which performance of the transform has been successful. Each child process also provides result data to the parent process for each candidate object to reduce the overhead of the parent process when performing the transform on the candidate object. The result data, which may include, for example, a set of instructions or hints, may allow a parent process to take advantage of the efforts of the child process in performing the transform.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anthony D. Drumm, Frank J. Musante, Jagannathan Narasimhan, Louise H. Trevillyan
-
Publication number: 20120156450Abstract: A stack of a second photoresist having a second photosensitivity and a first photoresist having a first photosensitivity, which is greater than second photosensitivity, is formed on a substrate. A first pattern is formed in the first photoresist by a first exposure and a first development, while the second photoresist underneath remains intact. A second pattern comprising an array of lines is formed in the second photoresist. An exposed portion of the second photoresist underneath a remaining portion of the first photoresist forms a narrow portion of a line pattern, while an exposed portion of the second photoresist outside the area of the remaining portions of the photoresist forms a wide portion of the line pattern. Each wide portion of the line pattern forms a bulge in the second pattern, which increases overlay tolerance between the second pattern and the pattern of conductive vias.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Wu-Song Huang, Wai-kin Li, Ping-Chuan Wang
-
Publication number: 20120159082Abstract: Methods and apparatuses are disclosed for direct access to cache memory. Embodiments include receiving, by a direct access manager that is coupled to a cache controller for a cache memory, a region scope zero command describing a region scope zero operation to be performed on the cache memory; in response to receiving the region scope zero command, generating a direct memory access region scope zero command, the direct memory access region scope zero command having an operation code and an identification of the physical addresses of the cache memory on which the operation is to be performed; sending the direct memory access region scope zero command to the cache controller for the cache memory; and performing, by the cache controller, the direct memory access region scope zero operation in dependence upon the operation code and the identification of the physical addresses of the cache memory.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Omer Heymann, Nadav Levison, Kevin C. Lin, Eric F. Robinson
-
Publication number: 20120158206Abstract: A method for regulating the temperature of a datacenter within an optimum temperature range includes predicting, using a computing device, a thermal load from a workload scheduler containing information on machines assembled in the datacenter to be turned on and/or off during a particular time period, and the thermal load of the datacenter associated with the work of the machines within the particular time period; and controlling at least one cooling system of the datacenter based upon the predicted thermal load within the particular time period under consideration of the thermal inertia of the datacenter by at least one of activating, controlling, and deactivating cooling resources of the cooling system in advance to maintain the temperature of the datacenter within the optimum temperature range.Type: ApplicationFiled: October 17, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Giuseppe Longobardi, Scot MacLellan, Giulio Santoli
-
Publication number: 20120158306Abstract: In one embodiment, the invention provides an analytical processing system for enhancing the recovery of heavy oil in an underground, near-surface crude oil extraction environment, comprising: a data collection engine configured for receiving data relating to the underground, near-surface crude oil extraction environment, wherein the data includes in situ microbial species data, oil properties data and in situ nutrient information that are identified as being germane to the underground, near-surface crude oil extraction environment; a data warehouse for storing data collected from the data collection engine; and a data modeling system for analyzing data stored in the data warehouse and facilitating an identity of a preferred microbial species from the underground, near-surface crude oil extraction environment that can transform the heavy oil into a lighter oil.Type: ApplicationFiled: February 22, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frederick D. Busche, John B. Rollins, Harold J. Noyes, James G. Bush
-
Publication number: 20120154165Abstract: In one embodiment, a computer system has a plurality of chassis interconnected by cables. Each cable initially connects a unique port pair consisting of a port of one chassis and a port of another chassis. The disconnection of cables is monitored, including electronically recording a disconnection sequence in which the port pairs are disconnected by removing each cable from at least one port of the respective port pair. Visual guidance is provided for re-cabling the computer system by sequentially identifying the port pairs in a reversal of the disconnection sequence, wherein identifying each port pair includes illuminating visual indicators associated with the ports of each port pair with a matching illumination pattern.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Fred A. Bower, III, Michael H. Nolterieke, William G. Pagan
-
Publication number: 20120158364Abstract: There is disclosed a method of monitoring an infrastructure comprising managed units, the method comprising the steps of: acquiring data associated with a first performance indicator from a first managed unit; determining a first quantized distribution function of at least a subset of pieces of data of the acquired data of the first managed unit; determining if the first quantized distribution function verifies one or a plurality of predefined rules describing particular distribution functions of performance indicators.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Duccio Luchi, Dario Mella, Stefano Zampieri
-
Publication number: 20120152298Abstract: An apparatus for generating electricity in a computer rack includes a plurality of thermoelectric generator modules secured in a planar assembly having a first side and a second side, wherein each thermoelectric generator module has a first thermally conductive substrate exposed on the first side of the planar assembly and a second thermally conductive substrate exposed on the second side of the planar assembly, and wherein the plurality of thermoelectric generator modules are operatively coupled in a circuit to supply electrical current. The apparatus further comprises a first duct for directing a first fluid stream across the first side of the planar assembly to supply heat to the first thermally conductive substrate, and a second duct for directing a second fluid stream across the second side of the planar assembly to withdraw heat from the second thermally conductive substrate.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel de Souza Casali, Rodrigo Ceron Ferreira de Castro, Breno Henrique Leitao, Thiago Cesar Rotta
-
Publication number: 20120155188Abstract: In a circuit that reduces power consumption in an array system of memory cells accessible in parallel, a local evaluation circuit is connected to a memory cell and a global bit line of the array system of memory cells. A selection circuitry splits the global bit line into an upper part and a lower part of the global bit line. The selection circuitry is adapted to receive an early set prediction signal and to connect the upper part of the global bit line to the lower part of the global bit line based on the early set prediction signal. The early set prediction signal indicates whether a set of memory cells, which include the memory cell, is being read. The circuit also includes a N:1 multiplexer connected to the lower part of the global bit line to receive the lower part of the global bit line as input.Type: ApplicationFiled: October 28, 2011Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Stefan Buettner, David A. Hrusecky, Werner Juchmes, Wolfgang Penth, Rolf Sautter
-
Publication number: 20120158641Abstract: A method for specifying complex event processing (CEP) system rules. A rule construction interface is provided for constructing rules for a rule set of the complex event processing system, where the rules include definitions of one or more detected events and corresponding actions. In response to an identification of a new event or action during the rule construction process via the rule construction interface, a corresponding event or action logical construct is generated for representing the event or action in the complex event processing system. An intermediate logical construct is generated to provide a data connection for the event or action logical construct. The event or action logical construct is linked to a corresponding action or event logical construct via the intermediate logical construct so as to enable data flow between the objects.Type: ApplicationFiled: February 26, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Doina L. Klinger, James S. Taylor
-
Publication number: 20120159627Abstract: Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Bryan E. Aupperle, David L. Kaminsky
-
Publication number: 20120155267Abstract: According to embodiments of the invention, there is provided a method, a system, and a computer program product for operating a network processor. The network processor processing a received data packet by reading a flow identification in the data packet; determining a quality of service criteria (QoSC) for the data packet; mapping the flow identification and the QoSC into an index for selecting a receive-queue for routing the data packet; and utilizing the index to route the data packet to the receive-queue.Type: ApplicationFiled: November 22, 2011Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Francois Abel, Claude Basso, Jean L. Calvignac, Natarajan Vaidhyanathan, Fabrice Verplanken, Colin B. Verrilli
-
Publication number: 20120155018Abstract: Apparatuses are provided for compressing a thermal interface material between a heat generating electronic component and a cooling electrical component. Embodiments include a rotatable latch fastened to the heat generating electrical component, the rotatable latch including a hook; wherein when the rotatable latch is in an engaged position, the hook of the rotatable latch engages a pin extending from the cooling electrical component such that the thermal interface material adhered to the heat generating electrical component is coupled to the cooling component; when the rotatable latch is in an unengaged position, the hook of the rotatable latch is not engaged with the pin of the cooling electrical component; a load screw; wherein when the rotatable latch is in the engaged position, threading the load screw into the rotatable latch moves the rotatable latch into a locked state; and a spring leaf that is coupled to the heat generating electrical component.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James D. Gerken, Jeffrey L. Justin, Christopher M. Marroquin
-
Publication number: 20120159303Abstract: Systems, methods, and computer products that create, update, save, and propagate customized views of table and grid information, including spreadsheets. The embodiment of the invention comprises associating at least one column as a first view of the table, associating at least one column as a second view of the table; and combining the first view with the second view, thereby efficiently creating a third view. Further, the combining includes dragging the second view; and dropping the dragged second view into the first view. The combining also includes creating a thumbnail image representing the first view or the second view. It also comprises updating columns that are shared between views. Additionally, the views may be stored, and new views may be propagated from the stored views.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas FRIEDRICH, Alexander Daniel ROBINSON, Kathy J. SETZER
-
Publication number: 20120155290Abstract: The invention relates to a method for carrying out predictive analysis relating to nodes of a communication network. The method comprises the steps of providing communication event information for a first set of nodes and a second set of nodes of the communication network, providing a set of attributes for the nodes of the first set, using said attributes and said communication event information for determining a set of groups among the first set of nodes, assigning each node of the second set to at least one group of the set of groups based at least on the communication event information available for the second group, the assigning resulting in membership information of the nodes of the second set as well as deriving or applying a prediction model for the second set of nodes based on the communication event information for the second set and the membership information.Type: ApplicationFiled: August 26, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patrick DANTRESSANGLE, Eberhard HECHLER, Martin OBERHOFER, Michael WURST
-
Publication number: 20120153429Abstract: A method is provided for fabricating a 3D integrated circuit structure. According to the method, a first active circuitry layer wafer is provided. The first active circuitry layer wafer comprises a P+ portion covered by a P? layer, and the P? layer includes active circuitry. The first active circuitry layer wafer is bonded face down to an interface wafer that includes a first wiring layer, and then the P+ portion of the first active circuitry layer wafer is selectively removed with respect to the P? layer of the first active circuitry layer wafer. Next, a wiring layer is fabricated on the backside of the P? layer. Also provided are a tangible computer readable medium encoded with a program for fabricating a 3D integrated circuit structure, and a 3D integrated circuit structure.Type: ApplicationFiled: February 16, 2012Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Mukta G. FAROOQ, Robert Hannon, Subramanian S. Iyer, Steven J. Koester, Sampath Purushothaman, Roy R. Yu
-
Publication number: 20120156393Abstract: A hydrogenated thin film is formed in a controlled vacuum on a substrate by evaporating one or more solid materials and passing the resulting vapor and a hydrogen-containing gas into a space between two electrodes. One of the electrodes includes openings for allowing the vapor to enter the space. Plasma is generated within the space to cause dissociation of the hydrogen-containing gas and promote a reaction between the material(s) and hydrogen-containing gas.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Osama Tobail, Ahmed Abou-Kandil, Mostafa M. El-Ashry, Jeehwan Kim, Paul M. Kozlowski, Mohamed Saad, Devendra K. Sadana
-
Publication number: 20120158619Abstract: Systems, methods, and computer products for optimally managing large rule sets are disclosed. Rule dependencies of rules within a set of rules may be determined as a function of rules execution frequency data generated from applying the rules over a data set. The rules within the set of rules may be clustered into rules clusters based on the determined rule dependencies, in which the rules clusters comprise disjoint subsets of the rules within the set of rules. Cluster frequency data for the rules clusters may be used to arrive at an optimal ordering.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MOHAN N. DANI, TANVEER A. FARUQUIE, HIMA P. KARANAM, L.V. SUBRAMANIAM, GIRISH VENKATACHALIAH
-
Publication number: 20120159273Abstract: In a test data access system, a shift register is coupled the test data in pin. A first multiplexer is in data communication with the TDI pin and is configured to receive data from the TDI pin and to transmit data to each of the instruments. The first multiplexer is also configured to receive data from a data recirculation bit and to transmit data from the TDI pin to a plurality of instruments when the recirculation bit has a first value and to transmit data to the plurality of instruments from a recirculation line when the recirculation bit has a second value, different from the first value. A second multiplexer is configured to receive data from each of the plurality of instruments and is configured to transmit data from a selected one of the plurality of instruments, selected based on a value of data in the shift register. A first AND gate is configured to generate a gates clock to the shift register. A second AND gate is responsive to the first AND gate, configured to lock the shift register.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Steven M. Douskey, Ryan Andrew Fitch, Michael J. Hamilton, Amanda R. Kaufer
-
Publication number: 20120159362Abstract: A system and method for constructing a graphical user interface for an application being accessed by a user are provided. The method includes measuring the user's current work rate, deriving a threshold from the user's current work rate, determining the user's current activity within the application, assigning a value to the user's current activity, accessing a model for the application, the model defining links between activities within the application, assigning values to activities linked within the accessed model to the user's current activity, and displaying a control element in a graphical user interface for each activity with a value above the derived threshold.Type: ApplicationFiled: December 15, 2011Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Martin Brown, David T. G. Drakard, Christopher Knott, Henning Lueke, Anthony P. Papageorgiou, Alena Shunkevich
-
Publication number: 20120158801Abstract: A Java object is scan-missed during the mark phase of a garbage collection cycle. A list of any unscanned objects, comprising all objects of a particular object type, is created during a sweep phase of the garbage collection cycle. After the garbage collection cycle is completed, and the application resumes, for every PUTFIELD/GETFIELD operation on the object type that is part of a specific parent object, a comparison is made with the relevant information in the unscanned objects list. A scan-miss is identified by determining whether the current object being referenced by the application is a part of the unscanned object list that has been created during the sweep phase of the garbage collection cycle.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: AMAR DEVEGOWDA, CHARLES R. GRACIE, VENKATARAGHAVAN LAKSHMINARAYANACHAR
-
Publication number: 20120152306Abstract: The present invention relates to a solar cell array, which includes a flexible, inflatable membrane. Multiple flexible photovoltaic cells are positioned on the top surface of the flexible membrane. The solar cell array also includes a container for the inflatable membrane and a structure for automatically inflating the membrane when at least one predetermined condition is met.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mickey Iqbal, John Falk Kelley, Calvin D. Lawrence
-
Publication number: 20120159097Abstract: Exemplary method, system, and computer program embodiments for, in a data storage environment configured for synchronous replication between a primary and secondary pair of storage entities, each having tiered storage devices, extent migration are provided. In one embodiment, by way of example only, a migration instruction is sent, by the primary storage entity, to the secondary storage entity, the migration instruction including a relative priority based on a primary ordered heat map of the tiered storage devices of the primary storage entity. The relative priority is used against a secondary ordered heat map of the tiered storage devices of the secondary storage entity to perform the extent migration, regardless of whether the primary and secondary storage entities are identical.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul A. JENNAS, II, Larry JUAREZ, David MONTGOMERY, Todd C. SORENSON
-
Publication number: 20120156611Abstract: Phenolic molecular glasses such as calixarenes include at least one fluoroalcohol containing unit. The fluoroalcohol containing molecular glasses can be used in photoresist compositions. Also disclosed are processes for generating a resist image on a substrate using the photoresist composition.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Luisa D. Bozano, Gregory Breyta, Ekmini A. DeSilva, William D. Hinsberg, Ratnam Sooriyakumaran, Linda K. Sundberg
-
Publication number: 20120159315Abstract: A method, system and computer program product for assisting users to generate the desired meme in a document. A document is scanned to identify parts of speech, numerical text or numbers and images (collectively the “terms”) that provide positive/negative memes. A score for each of these terms is assigned. A score may then be assigned to each designated primary object (e.g., individual, company) discussed in the document using the scores assigned to the identified terms. Options may then be provided to modify the document to provide the type of meme (e.g., positive or negative meme) desired by the author to be associated with the particular designated primary object. Upon receiving a selection of one or more of these options, the document is modified accordingly to generate the desired meme in the document.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Liam Harpur, Daniel J. McCloskey, Simon P. O'Doherty
-
Publication number: 20120158906Abstract: A method, operable by a service registry in a service orientated architecture system, for providing a service within the system. A service request is received from a service requester in the system. The status of the service is checked as registered in the service registry. In response to the service not having a registered service endpoint or a property of the service falling below a defined threshold, a request is sent to service providers or subsequent service registries to provide a new service and according to the defined threshold. In response to a service provider providing the new service according to the defined standard, the service registry is updated with the new service and responding to the service requester that the service is available. The embodiments allow both direct interaction between the requester and provider or indirect interaction via a service management layer.Type: ApplicationFiled: February 26, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas J. Bailey, Christopher D. Jenkins, Jonathan M. Roberts, Kieran P. Scott
-
Publication number: 20120158831Abstract: An object request associated with a requesting entity can be identified. The object request can comprise of an object identifier and an object type associated with an object instance which can be a renderable entity. The entity can be a widget within an application executing within a client device. An object type associated with the object request can be determined which can be decomposed into an attribute request based a selected schema. The attribute request can comprise of an object instance identifier and an attribute identifier associated with an attribute value. An attribute index associated with a client-side object cache can be queried for the attribute value. When the attribute value exists in the attribute index, an appropriate attribute value associated with the attribute can be conveyed to the entity. When the attribute value is absent from the attribute index, the attribute request can be conveyed to a request aggregator.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael B. Beaver, Jason A. Collier, Jeffrey S. Jagoda, Marlies Santos Deas
-
Publication number: 20120158879Abstract: A dialog server which provides dialogs made by at least one user through their respective avatars in a virtual space. A method and a computer readable article of manufacture tangibly embodying computer readable instructions for executing the steps of the method are also provided. The dialog server includes: a position storage unit which stores positional information on the avatars; an utterance receiver which receives at least one utterance of avatars and utterance strength representing an importance or attention level of the utterance; an interest level calculator which calculates interest levels between avatars based on their positional information; a message processor which generates a message based on the utterance in accordance with a value calculated from the interest levels and the utterance strength; and a message transmitter which transmits the message to the avatars.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gakuto Kurata, Tohru Nagano, Michiaki Tatsubori
-
Publication number: 20120159461Abstract: An apparatus having a transactional memory enabling exclusive control to execute a transaction. The apparatus includes: a first code generating unit configured to interpret a program, and generate first code in which a begin instruction to begin a transaction and an end instruction to commit the transaction are inserted before and after an instruction sequence including multiple instructions to execute designated processing in the program; a second code generating unit configured to generate second code at a predetermined timing by using the multiple instructions according to the designated processing; and a code write unit configured to overwrite the instruction sequence of the first code with the second code or to write the second code to a part of the first code in the transaction.Type: ApplicationFiled: November 30, 2011Publication date: June 21, 2012Applicant: International Business Machines CorporationInventor: Takuya Nakaike
-
Publication number: 20120154412Abstract: An accelerator work allocation mechanism determines at run-time which functions to allocate to a hardware accelerator based on a defined accelerator policy, and based on an analysis performed at run-time. The analysis includes reading the accelerator policy, and determining whether a particular function satisfies the accelerator policy. If so, the function is allocated to the hardware accelerator. If not, the function is allocated to the processor.Type: ApplicationFiled: December 20, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Raymond Keith Harney, John Matthew Santosuosso
-
Publication number: 20120153909Abstract: Voltage regulator circuits and methods implementing hybrid fast-slow passgate control circuitry are provided to minimize the ripple amplitude of a regulated voltage output. In one aspect, a voltage regulator circuit includes a comparator, a first passgate device, a second passgate device, and a bandwidth limiting control circuit. The comparator compares a reference voltage to a regulated voltage at an output node of the voltage regulator circuit and generates a first control signal on a first gate control path based on a result of the comparing. The first and second passgate devices are connected to the output node of the regulator circuit. The first passgate device is controlled in a bang-bang mode of operation by the first control signal to supply current to the output node. The bandwidth limiting control circuit has an input connected to the first gate control path and an output connected to the second passgate device.Type: ApplicationFiled: August 19, 2011Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: William L. Bucossi, John F. Bulzacchelli, Mohak Chhabra, Zeynep Toprak-Deniz, Daniel J. Friedman, Joseph A. Iadanza, Todd M. Rasmus
-
PHOTOVOLTAIC DEVICES WITH AN INTERFACIAL GERMANIUM-CONTAINING LAYER AND METHODS FOR FORMING THE SAME
Publication number: 20120152352Abstract: A germanium-containing layer is provided between a p-doped silicon-containing layer and a transparent conductive material layer of a photovoltaic device. The germanium-containing layer can be a p-doped silicon-germanium alloy layer or a germanium layer. The germanium-containing layer has a greater atomic concentration of germanium than the p-doped silicon-containing layer. The presence of the germanium-containing layer has the effect of reducing the series resistance and increasing the shunt resistance of the photovoltaic device, thereby increasing the fill factor and the efficiency of the photovoltaic device. In case a silicon-germanium alloy layer is employed, the closed circuit current density also increases.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicants: EGYPT NANOTECHNOLOGY CENTER, INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tze-Chiang Chen, Jee H. Kim, Devendra K. Sadana, Ahmed Abou-Kandil, Mohamed Saad -
Publication number: 20120158859Abstract: A device communicatively linked with a text exchange session can be identified. The device can be a computing device associated with a computing resource. The resource can be associated with a state and state information. The device can be associated with a text exchange application. State information associated with the computing resource can be obtained. The state information can be a resource identifier and a resource value. A computing resource state change can be determined. The determination can be responsive to a disconnect event associated with the device. The disconnect event can result in the device not communicatively linked to the text exchange session.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: PUKHRAJ SAXENA, RADHIKA SOHONI
-
Publication number: 20120159266Abstract: A method, apparatus and software is disclosed in which original exceptions issued by an application program are encoded as substitute exceptions with associated metadata identifying the original exception so as to enable to enable a first application program receiving the exception but not arranged to process the original exception to process the substitute exception and to enable a second application program receiving the exception and arranged to process the original exception to extract and process that original exception.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: International Bussiness Machines CorporationInventor: Timothy J. Baldwin
-
Publication number: 20120155026Abstract: A first conduit is externally attached to one of two opposing sidewalls of electronic equipment and a second conduit is externally attached to the other of the opposing sidewalls. Each conduit has an open end, a closed end, and a side having a vent that is aligned with a vent in the sidewall of the electronic equipment to which that conduit is attached. The first conduit takes air in through its open end, channels the air in a direction substantially orthogonal to the direction of air flowing through the electronic equipment, and directs the air into the electronic equipment through its aligned vents. The second conduit receives air from the electronic equipment through its aligned vents, channels the air in a direction that is substantially orthogonal to the direction of air flowing through the electronic equipment, and exhausts the air through the open end of the second conduit.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Atul Tambe
-
Publication number: 20120159451Abstract: In an embodiment, execution of a first thread of a plurality of threads is halted at a first instruction. A subset of the plurality of threads is determined that execute the first instruction while the first thread is halted at the first instruction. Identifiers of the subset of the plurality of threads that execute the first instruction while the first thread is halted at the first instruction are presented via a user interface for the first thread.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Cary L. Bates
-
Publication number: 20120158812Abstract: Methods, computer systems, and computer program products for calculating a remainder by division of a sequence of bytes interpreted as a first number by a second number are provided. A first remainder by division associated with a first subset of the sequence of bytes is calculated with a first processor. A second remainder by division associated with a second subset of the sequence of bytes is calculated with a second processor. The calculating of the second remainder by division may occur at least partially during the calculating of the first remainder by division. A third remainder by division is calculated based on the calculating of the first remainder by division and the calculating of the second remainder by division.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael HIRSCH, Shmuel T. KLEIN, Yair TOAFF
-
Publication number: 20120159457Abstract: Identifying conflicting declared invalid runtime references of overlaid data structures of a shared memory area as declared in a program listing. The identifying includes identifying a first data structure and a first parameter list in the program listing. A first routine call and a sequential flow of execution of the first routine call through the program listing in order to write data to the shared memory area are identified. A second data structure and a second parameter list in the program listing are identified. A second routine call and a second sequential flow of execution of the second routine call through the program listing in order to write data to the shared memory area are identified. It is determined whether the second routine call is attempting to overwrite data of the first routine call with the data of the second routine call in the shared memory area.Type: ApplicationFiled: November 9, 2011Publication date: June 21, 2012Applicant: International Business Machines CorporationInventors: Edward A. Addison, Peggy A. DeVal, Philip R. Lee, Andrew Wright
-
Publication number: 20120159192Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: March 1, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20120159491Abstract: A method, system and article of manufacture for workflow processing and, more particularly, for managing creation and execution of data driven dynamic workflows. One embodiment provides a computer-implemented method for managing execution of workflow instances. The method comprises providing a parent process template and providing a child process template. The child process template is configured to implement an arbitrary number of workflow operations for a given workflow instance, and the parent process template is configured to instantiate child processes on the basis of the child process template to implement a desired workflow. The method further comprises receiving a workflow configuration and instantiating an instance of the workflow on the basis of the workflow configuration. The instantiating comprises instantiating a parent process on the basis of the parent process template and instantiating, by the parent process template, one or more child processes on the basis of the child process template.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Melissa Aron, Michael A. Blocksome, David G. Herbeck, Todd E. Johnson
-
Publication number: 20120159063Abstract: For selecting an input/output tape volume cache (TVC), a history module maintains access history instances for a plurality of clusters, each cluster comprising a TVC. A request module receives an access request for a logical volume wherein an instance of the logical volume is stored on each of the plurality of clusters and each instance of the logical volume is synchronized with each other instance of the logical volume. An adjustment module weights the access history instances in favor of recent access history instances. A calculation module calculates an affinity of the logical volume instance stored on each cluster of the plurality of clusters. A selection module selects a cluster TVC with a highest logical volume affinity as the TVC for the logical volume.Type: ApplicationFiled: February 23, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: THIRUMALE N. NIRANJAN, JOSEPH M. SWINGLER
-
Publication number: 20120158961Abstract: The present invention generally provides methods, systems and articles of manufacture that provide an autonomous system for enabling rich network applications. Embodiments of the invention may monitor an existing network application and generate a profile on the network application based on what responses and data updates are triggered by various requests from a user. Embodiments of the invention may refactor the existing network application into a rich network application based on the profile created for that network application.Type: ApplicationFiled: February 23, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian J. Cragun, John E. Petri
-
Publication number: 20120159009Abstract: An Extended Input/output (I/O) measurement word facility is provided. Provision is made for emulation of the Extended I/O measurement word facility. The facility provides for storing measurement data associated with a single I/O operation in an extended measurement word associated with an I/O response block. In a further aspect, the stored data may have a resolution of approximately one-half microsecond.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott M. Carlson, Greg A. Dyck, Tan Lu, Kenneth J. Oakes, Dale F. Riedy, JR., William J. Rooney, John S. Trotter, Leslie W. Wyman, Harry M. Yudenfriend
-
Publication number: 20120159433Abstract: A technique is disclosed for identifying impact of database changes on an application. Given a proposed database change, affected source code is identified that is affected by the proposed database change. References to the affected source code are created and organized into a hierarchy. A user can ascertain the extent of the impact by viewing the hierarchy and by using the hierarchy to access and view the affected source code in a visually distinct manner.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Azadeh Ahadian, Stephen A. Brodsky, Michael G. Burke, Zeus O. Courtois, Tony K. Leung, Rebecca B. Nin, Igor Peshansky, Sonali Surange
-
Publication number: 20120159487Abstract: In an embodiment, a first thread of a plurality of threads of a program is halted. A subset of the plurality of threads are determined that are waiting for a mutex that is locked by the first thread while the first thread is halted. Identifiers of the subset of the plurality of threads are presented. The subset of the plurality of threads may have their execution directly blocked and/or indirectly blocked by a lock on the mutex by the first thread. In embodiment, the first thread is halted in response to the first thread encountering a breakpoint, and the subset of the plurality of threads do not halt in response to the first thread encountering the breakpoint.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Cary L. Bates
-
Publication number: 20120158317Abstract: A method that identifies common peaks among unidentified peaks in the data from different LC-MS or LC-MS/MS runs is provided. The method employs an algorithm, herein referred to as “Precision Peak Matching (PPM).” The different runs can be from different laboratories, instruments, and biological samples that result in a significant variability in the data. PPM allows estimation and control of precision, defined as the fraction of truly identical peptide pairs among all pairs retrieved, in the matching process. PPM finds the maximal number of peptide pairs at a prescribed precision, thereby allowing quantitative control over the trade off between the number of true pairs missed, and false pairs found. PPM finds common peptides from a database of LC-MS runs of heterogeneous origins, and at the specified precision. PPM fills a much-needed role in proteomics by extracting useful information from disparate LC-MS databases in a statistically rigorous and interpretable manner.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peicheng Du, Frank Suits
-
Publication number: 20120158780Abstract: An information processing method for defining a data structure for pattern matching, the method executed by an information processing apparatus, comprises generating, by the apparatus, an ordered tree structure by defining transition edges between nodes using, as transition conditions, respective constraints from one or more constraint patterns each including plural constraints; searching, by the apparatus, for a second substructure similar to a first substructure from a root node by determining a set relation between transition conditions of respective transition edges; and defining, by the apparatus, an additional transition link from a tail node of the second substructure to a child node at a tail end of the first substructure, the additional transition link adding a constraint to be met by an indeterminant identified from the set relation.Type: ApplicationFiled: February 29, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Teruo Koyanagi, Yuta Tsuboi
-
Publication number: 20120158790Abstract: Data is represented as a tree structure. A structure identifier (ID) that mathematically defines a structure of the tree structure is calculated. The structure ID is a representation of the structure of the tree structure and is independent of node names and node values of the tree structure. A mapping of the structure ID to the tree structure is stored.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Sandeep Chowdhury
-
Publication number: 20120159492Abstract: Systems, methods and articles of manufacture are disclosed for processing documents for electronic discovery. A request may be received to perform a task on documents, each document having a distinct document identifier. A task record may be generated to represent the requested task. The task record may include information specific to the request task. However, the task record need not include any document identifiers. At least one batch record may be generated that includes the document identifier for each of the documents. The task record may be associated with the at least one batch record. The requested task may be performed according to the task record and the at least one batch record. An audit record may be generated for the performed task. The audit record may be associated with the at least one batch record.Type: ApplicationFiled: February 24, 2012Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: KENNETH CARLIN NELSON, BRETT EDWARD MORRIS