IBM Patents
The International Business Machines Corporation provides IT infrastructure and services to enterprise customers.
IBM Patents by Type- IBM Patents Granted: IBM patents that have been granted by the United States Patent and Trademark Office (USPTO).
- IBM Patent Applications: IBM patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090081418Abstract: The present invention provides a method of fabricating an interconnect structure in which a patternable low-k material replaces the need for utilizing a separate photoresist and a dielectric material. Specifically, this invention relates to a simplified method of fabricating single-damascene and dual-damascene low-k interconnect structures with at least one patternable low-k dielectric and at least one inorganic antireflective coating. In general terms, a method is provided that includes providing at least one patternable low-k material on a surface of an inorganic antireflective coating that is located atop a substrate. The inorganic ARC is liquid deposited and comprises a polymer that has at least one monomer unit comprising the formula M-R1 wherein M is at least one of Si, Ge, B, Sn, Fe, Ta, Ti, Ni, Hf and La and R1 is a chromophore. At least one interconnect pattern is formed within the at least one patternable low-k material and thereafter the at least one patternable low-k material is cured.Type: ApplicationFiled: September 20, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert D. Allen, Phillip J. Brock, Blake W. Davis, Wu-Song S. Huang, Qinghuang Lin, Alshakim Nelson, Sampath Purushothaman, Ratnam Sooriyakumaran
-
Publication number: 20090079570Abstract: A computer implemented method, data processing system, and computer program product that enable a component to prepare for the arrival of a moving component by providing, to the component, an automated notification of the moving component's approach. When a moving component approaches an arrival point, a signal is received from a transponder chip on the moving component, wherein the signal includes a unique identifier for the transponder chip. The moving component is then identified based on the unique identifier in the signal. A second signal is sent to the component to signal that initiation of a set of actions to be performed with respect to the moving component may occur.Type: ApplicationFiled: December 8, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julianne Yarsa, James Andre Rocke
-
Publication number: 20090079077Abstract: An interconnect structure including a gouging feature at the bottom of the via openings and a method of forming the same, which does not introduce either damages caused by Ar sputtering into the dielectric material that includes the via and line openings, nor plating voids into the structure are provided. The method includes the uses of at least one infusion process that forms an infused surface region within a conductive material of a lower interconnect level. The infused surface region has a different etch rate as compared with the conductive material and thus in a subsequent etching process, the infused surface region can be selectively removed forming a gouging feature within the structure.Type: ApplicationFiled: September 20, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chih-Chao Yang, Keith Kwong Hon Wong
-
Publication number: 20090080623Abstract: A method of providing voice metrics over an established telephone call between a user and a subscriber can include receiving voice information from the user over the call and determining biometric information from the voice information for the user. The method further can include encoding the biometric metric information and sending the biometric information to the subscriber over the call.Type: ApplicationFiled: December 8, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas E. Creamer, Peeyush Jaiswal, Victor S. Moore
-
Publication number: 20090079030Abstract: A method of forming a trench memory cell includes forming a trench capacitor within a substrate material, the trench capacitor including a node dielectric layer formed within a trench and a conductive capacitor electrode material formed within the trench in contact with the node dielectric layer; forming a strap mask so as cover one side of the trench and removing one or more materials from an uncovered opposite side of the trench; and forming a conductive buried strap material within the trench; wherein the strap mask is patterned in a manner such that a single-sided buried strap is defined within the trench, the single-sided buried strap configured in a manner such that the deep trench capacitor is electrically accessible at only one side of the trench.Type: ApplicationFiled: July 9, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Kangguo Cheng, Ramachandra Divakaruni, Herbert L. Ho, Geng Wang
-
Publication number: 20090083337Abstract: A method, system and computer program product for performing synchronization between source and target tables. An external data source inserts a new row in a first table as it modifies or creates a row in the source table where each new row in the first table includes a primary key value associated with the modified/created row in the source table. An application copies the distinct values for the primary keys listed in the first table and inserts them in a second table. The application performs uncommitted read operations on the source table for each row corresponding to the primary key values stored in the second table. The application inserts the data read into the corresponding rows of the target table. In this manner, a platform agnostic application may be able to synchronize the relational source and target tables in an efficient manner while minimizing the contention at the source table.Type: ApplicationFiled: September 21, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Benjamin Michael Parees, David Michael Eads, David Michael Enyeart, Luis Eduardo Guillen-Sanchez, Latha Sivakumar, Dan McBryde Willey
-
Publication number: 20090083492Abstract: A hardware based method for determining when to migrate cache lines to the cache bank closest to the requesting processor to avoid remote access penalty for future requests. In a preferred embodiment, decay counters are enhanced and used in determining the cost of retaining a line as opposed to replacing it while not losing the data. In one embodiment, a minimization of off-chip communication is sought; this may be particularly useful in a CMP environment.Type: ApplicationFiled: November 17, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Alper Buyuktosunoglu, Zhigang Hu, Jude A. Rivers, John T. Robinson, Xiaowei Shen, Vijayalakshmi Srinivasan
-
Publication number: 20090080334Abstract: Congestion is adaptively controlled in a data center Ethernet (DCE) network. Packets are received over at least one virtual lane in the DCE network. An absolute or relative packet arrival rate is computed over a time period. The absolute or relative packet arrival rate is compared to at least a first threshold and a second threshold. If the absolute or relative packet arrival rate increases beyond the first threshold, the packet transmission rate is caused to decrease. If the absolute or relative packet arrival rate is less than a second threshold, the packet transmission rate is caused to increase.Type: ApplicationFiled: September 26, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Casimer DeCusatis, Thomas A. Gregg
-
Publication number: 20090081585Abstract: Linear or branched functionalized polycarbosilanes having an absorbance less than 3.0 ?m?1 at 193 nm and a relatively high refractive index are provided. The functionalized polycarbosilanes contain at least one pendant group that is acid labile or aqueous base soluble. Also disclosed are photoresists formulations containing the functionalized polycarbosilanes that are suitable for use in lithography, e.g., immersion lithography.Type: ApplicationFiled: March 28, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert D. Allen, Matthew E. Colburn, Daniel P. Sanders, Ratnam Sooriyakumaran, Hoa D. Truong
-
Publication number: 20090079027Abstract: A deep trench is formed in a semiconductor-on-insulator (SOI) substrate and a pad layer thereupon. A conductive trench fill region is formed in the deep trench. A planarizing material layer having etch selectivity relative to the pad layer is applied. A portion of the pad layer having an edge that is vertically coincident with a sidewall of the deep trench is exposed by lithographic means. Exposed portion of the pad layer are removed selective to the planarizing material layer, followed by removal of exposed portion of a semiconductor layer selective to the conductive trench fill region by an anisotropic etch. The planarizing material layer is removed and a shallow trench isolation structure having a lower sidewall that is self-aligned to an edge of the original deep trench is formed. Another shallow trench isolation structure may be formed outside the deep trench concurrently.Type: ApplicationFiled: September 26, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kangguo Cheng, Munir D. Naeem, David M. Dobuzinsky, Byeong Y. Kim
-
Publication number: 20090082902Abstract: A method and system are disclosed for determining the locations of parts in a warehouse. The method comprises the step of generating for each part an associated designator having first and second components, including the steps of, for each of the parts, (i) determining the first component of the associated designator based on physical dimensions of the part, and (ii) determining the second component of the associated designator based on a pick velocity of the part. These designators are used to identify locations in the warehouse for the parts. In a preferred embodiment, the first components of the designators are used to determine the distances of the identified locations for the parts from an entrance/exit of the warehouse, and the second components of the designators are used to determine the heights of the identified locations for the parts in the warehouse.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Christopher T. Foltz, Sreekanth Ramakrishnan
-
Publication number: 20090081597Abstract: Linear or branched functionalized polycarbosilanes having an absorbance less than 3.0 ?m?1 at 193 nm and a relatively high refractive index are provided. The functionalized polycarbosilanes contain at least one pendant group that is acid labile or aqueous base soluble. Also disclosed are photoresists formulations containing the functionalized polycarbosilanes that are suitable for use in lithography, e.g., immersion lithography.Type: ApplicationFiled: March 28, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert D. Allen, Matthew E. Colburn, Daniel P. Sanders, Ratnam Sooriyakumaran, Hoa D. Truong
-
Publication number: 20090083708Abstract: A method and system are provided for aspect scoping in a modularity runtime. The method includes declaring a set of aspects of a bundle as public aspects in a first aspect configuration file, and filtering the aspect configuration files imported by a bundle to the files from bundles on which the importing bundle has a dependency. The method includes declaring a set of aspects of a bundle as private aspects in a second aspect configuration file. At weaving of aspects at a bundle, the weaving includes: any aspects defined as private aspects; any aspects defined as public aspects; any imported aspects; and any first configuration files from exporting bundles are declared.Type: ApplicationFiled: April 3, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Evans Knibb, Matthew Alexander Webster
-
Publication number: 20090083624Abstract: Described herein are processes and devices that create and manage documents in a virtual universe. One of the devices described is a virtual document converter. The virtual document converter can determine a plurality of text objects associated with a document graphic. The plurality of text objects present text, such as of a multiple page virtual document in a virtual universe. The virtual document converter generates a single, multi-page document file, for example, by encoding the text presented by the plurality of text objects into the document file.Type: ApplicationFiled: September 25, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, James W. Seaman, Keith R. Walker
-
Publication number: 20090079076Abstract: The present invention provides a method of fabricating an interconnect structure in which a patternable low-k material replaces the need for utilizing a separate photoresist and a dielectric material. Specifically, this invention relates to a simplified method of fabricating single-damascene and dual-damascene low-k interconnect structures with at least one patternable low-k dielectric and at least one inorganic antireflective coating. In general terms, a method is provided that includes providing at least one patternable low-k material on a surface of an inorganic antireflective coating that is located atop a substrate, said inorganic antireflective coating is vapor deposited and comprises atoms of M, C and H wherein M is at least one of Si, Ge, B, Sn, Fe, Ta, Ti, Ni, Hf and La; forming at least one interconnect pattern within the at least one patternable low-k material; and curing the at least one patternable low-k material.Type: ApplicationFiled: September 20, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Qinghuang Lin, Deborah A. Neumayer
-
Publication number: 20090083569Abstract: A method for generating a local clock domain within an operation includes steps of: receiving a clock frequency measurement for a slow portion of logic within the operation; generating a local signal to indicate commencement of the operation and to function as a clock gating signal; latching the clock gating signal to a selected cycle; generating clock domain controls based on the clock gating signal such that the operation times its commencement on the selected cycle; and propagating the clock gating signal in ungated latches for a number of cycles, such that a second operation is restricted from being launched until the operation completes.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sean Michael Carey, William Vincent Huott, Christian Jacobi, Guenter Mayer, Timothy Gerard McNamara, Chung-Lung Kevin Shum, Hans-Werner Tast, Michael Hemsley Wood
-
Publication number: 20090083483Abstract: Power conservation in a redundant array of inexpensive drives (‘RAID array’) that preserve RAID functionality, the RAID array including RAID subarrays of a same RAID specification, including powering off a drive in at least one of the RAID subarrays; responsive to a write request directed to a particular subarray containing a powered off drive, writing data redundantly to a RAID cache that is independent from the subarray having a powered off drive; powering on the powered-off drive; and flushing the written data from the cache to the particular subarray to which it was originally directed.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ganesh Balakrishnan, Dustin M. Fredrickson
-
Publication number: 20090083853Abstract: Providing extended or end-to-end data integrity through layers of a system. In one aspect, information is to be transmitted between an application end of the system and a physical storage medium that stores the information for a database of the system, the information to be transmitted via a database server in a database server layer of the system. At least a portion of data protection is provided for the information, the data protection causing the information to be protected from corruption between a system layer and the physical storage medium, where the system layer is a separate layer provided closer to the application end of the system than the database server layer.Type: ApplicationFiled: September 26, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Blair K. Adamache, Kenneth Wayne Boyd, Robert Frederic Kern, Jeffrey William Palm, Mark Francis Wilding
-
Publication number: 20090083348Abstract: Mechanisms of memory management in a scoped memory system of a data processing system having a one or more scoped memory areas are provided. The mechanisms identify a set of one or more child scoped memory areas of the scoped memory area for garbage collection. The mechanisms further identify, in each scoped memory area of the set, references to the scoped memory area for garbage collection as root references for objects allocated in the scoped memory area of the scoped memory system, thereby generating a set of root references. The mechanisms also recursively traversing and marking objects that are referenced from the set of root references and that are allocated in the scoped memory area of the scoped memory system and identify objects in the scoped memory area of the scoped memory system that are not so marked. The identified objects are discarded from the scoped memory system.Type: ApplicationFiled: September 23, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventor: Andrew Johnson
-
Publication number: 20090083249Abstract: A method for utilizing earcons, includes: forming a database of earcons; forming a user profile and preferences database; monitoring user audio content; monitoring the user environment; playing a series of earcons from the database of earcons on a user's communication device; wherein the series of earcons are chosen from the database of earcons based on the user profile and preferences database; and wherein the playing of individual earcons from the series of earcons is based on the monitored user audio content and environment.Type: ApplicationFiled: September 25, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINE CORPORATIONInventors: Sara H. Basson, Ramesh Gopinath, Dimitri Kanevsky, Edward E. Kelley
-
Publication number: 20090083112Abstract: Methods and apparatus, including computer program products, implementing and using techniques for modifying an event in an electronic calendar system. An event invitation is created in the electronic calendar system. A first timeout value is associated with the event invitation. The first timeout value specifies a time for replying to the event invitation. The event invitation is sent to one or more invitees and the first timeout value is applied to at least a subset of the one or more invitees. If a response to the event invitation is not received from an invitee with an applied timeout value within the time specified by the first timeout value, a first action relating to the event is performed.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Kulvir Singh Bhogal, Robert Ross Peterson, Lisa Anne Seacat
-
Publication number: 20090083292Abstract: A method and processor to determine distances between multiple index driven scan operations. A first anchor index entry is identified during a first index scan and stored. A first number of index entries between the first anchor index entry and a first index scan location being processed by a first index scan is determined based on information maintained external to an index structure. A determination is made of second number of index entries between the first anchor index entry and a second index scan location being processed by a second index scan executing concurrently with the first index scan based on information maintained external to the index structure. A distance between the first index scan location and the second index scan location is calculated as equal to a difference between the first number of index entries and the second number of index entries.Type: ApplicationFiled: September 21, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: BISHWARANJAN BHATTACHARJEE, Christian A. Lang, Timothy R. Malkemus
-
Publication number: 20090079075Abstract: The present invention provides an interconnect structure in which a patternable low-k material is employed as an interconnect dielectric material. Specifically, this invention relates to single-damascene and dual-damascene low-k interconnect structures with at least one patternable low-k dielectric. In general terms, the interconnect structure includes at least one patterned and cured low-k dielectric material located on a surface of a substrate. The at least one cured and patterned low-k material has conductively filled regions embedded therein and typically, but not always, includes Si atoms bonded to cyclic rings via oxygen atoms. The present invention also provides a method of forming such interconnect structures in which no separate photoresist is employed in patterning the patterned low-k material.Type: ApplicationFiled: September 20, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Qinghuang Lin, Shyng-Tsong Chen
-
Publication number: 20090083706Abstract: A system and method are disclosed for graphically building business rule conditions. The method of graphically building business rule conditions comprises displaying a menu of function icons for the user, and a menu of business rule attribute icons for the user. The method allows the user to freely drag and drop functions and attributes onto a staging canvas, and relate the functions and attributes to build a graphical depiction of the desired business rule condition. The method generates source code directly from the graphical depiction such that the user does not have to understand the specific syntax and nuances of the development environment or runtime environment for the business rule.Type: ApplicationFiled: December 2, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yury Kosov, Juliana Hing Tsang
-
Publication number: 20090080777Abstract: A method of filtering video packets for video stream monitoring is provided. A video packet of a video stream is received. One or more features are extracted from a specified frame of the video packet via one or more histograms and frequency domain coefficients of the specified frame. One or more concept detectors are implemented on the one or more features creating one or more confidence values. The confidence values are transmitted to a display module for filtering of video packets.Type: ApplicationFiled: May 13, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Lisa Dronette Amini, Ching-Yung Lin, Olivier Verscheure
-
Publication number: 20090083106Abstract: Methods and apparatus, including computer program products, implementing and using techniques for managing contingent events in an electronic calendar system. A priority is associated with each event among two or more events. The two or more events are at least partly overlapping in the electronic calendar system. When a high priority event of the two or more events is canceled from the electronic calendar system, the high priority event is automatically replaced with a lower priority event from the two or more events.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Kulvir Singh Bhogal, Robert Ross Peterson, Lisa Anne Seacat
-
Publication number: 20090083341Abstract: A method, system and computer program product for ensuring that archival data deleted in a source table is already stored in a target table. An external data source sets a flag in the first table to identify the row in the source table to be deleted. An application sets a flag in a second table for each row of the source table that is marked to be deleted according to the first table. The application performs uncommitted read operations on the source table for each row corresponding to the distinct primary key values stored in the first table. The application inserts the data read into the corresponding rows of the target table. The application deletes the rows in the source table indicated to be deleted by the second table. In this manner, the archival data deleted from the source table is ensured to already be stored in the target table.Type: ApplicationFiled: September 21, 2007Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Benjamin Michael Parees, David Michael Eads, David Michael Enyeart, Luis Eduardo Guillen-Sanchez, Latha Sivakumar, Dan McBryde Willey
-
Publication number: 20090083268Abstract: In some embodiments the management of revisions to segments of code or artifacts is disclosed. Such management can assist a software developer in the development of software. In some embodiments, a developer can retrieve a versioned file from a repository, modify content of the versioned file to create a variant of the versioned file, compare the variant to the versioned file, and determine a difference between the versioned file and the variant. Then, the one or more attribute can be assigned to the differences and the attributes can be indexed such that the variants can be located in response to a search. In some embodiments variants can be indexed based on a variability point to which they can be matched. Other embodiments are also disclosed.Type: ApplicationFiled: September 23, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Regis Coqueret, Bertrand H. Portier
-
Publication number: 20090079833Abstract: The present solution can include a method for allowing the selective modification of audio characteristics of items appearing in a video. In this method, a RFID tag can be loaded with audio characteristics specific to a sound-producing element. The RFID tag can then be attached to an item that corresponds to the sound-producing element. The video and audio of the area including the item can be recorded. The audio characteristics can be automatically obtained by scanning the RFID tag. The audio characteristics can then be embedded within the video so that the audio characteristics are available when the item appears in the video.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUBIL M. ABRAHAM, VINOD A. BIJLANI, MATHEWS THOMAS
-
Publication number: 20090083594Abstract: Mechanisms for testing functional boundary logic at an asynchronous clock boundary of an integrated circuit device are provided. With these mechanisms, each clock domain has its own scan paths that do not cross domain boundaries. By eliminating the scanning across the boundaries, the requirement to have two clock grids in the asynchronously clocked domains may be eliminated. As a result, circuit area and design time with regard to the clock distribution design are reduced. In addition, removing the second clock grid, i.e. the high speed core or system clock, in the asynchronously clocked domains removes the requirement to have a multiplexing scheme for selection of clocking signals in the asynchronous domain. In addition to the above, the system and method provide boundary built-in-self-test logic for testing the functional crossing logic of boundaries between the clock domains in a functional mode of operation.Type: ApplicationFiled: December 5, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Nathan P. Chelstrom, Steven R. Ferguson, Mack W. Riley
-
Publication number: 20090080461Abstract: Packet switching node in a communication system includes apparatus for receiving incoming information packets or frames which contain header portions with formatting control blocks. Information in the frame's header contains frame alteration commands for modifying the information in the frame. The modifications include adding new information, deleting information, and overlaying information. Decoders and control devices in an alteration engine interpret the commands and apply the modifications to the frame data. Common and standard data patterns are stored for insertion or overlaying to conserve data packet space.Type: ApplicationFiled: December 3, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: PETER I. A. BARRI, CLAUDE BASSO, JEAN L. CALVIGNAC, BRAHMANAND K. GORTI, JOSEPH F. LOGAN, NATARAJAN VALDHYANATHAN, JOHAN G. A. VERKINDEREN
-
Publication number: 20090083720Abstract: Optimizations are provided for processing environments. Selected memory objects are tagged with unique identifiers by an operating system of the environment, and those identifiers are used to manage processing within the environment. By detecting by a processing platform of the environment that a memory object has been tagged with a unique identifier, certain tasks may be bypassed and/or memory objects may be reused, even if located at a different location.Type: ApplicationFiled: September 21, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Theodore J. Bohizic, Rahul Chandrakar, Viktor S. Gyuris
-
Publication number: 20090083107Abstract: Method and system for strategic global resource sourcing in one aspect incorporates concurrently a plurality of qualitative and quantitative attributes that influence performance of sourcing strategy with respect to one or more quantitative measures, quantifies an impact of said qualitative attributes using said one or more quantitative measures, and optimizes the sourcing strategy with respect to said one or more quantitative measures subject to one or more constraints.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ching-Hua Chen-Ritzo, Daniel Patrick Connors, Markus Ettl, Mayank Sharma, Karthik Sourirajan
-
Publication number: 20090083684Abstract: The present invention relates to a method for validating the correct logical function and timing behavior of a digital circuit design within a cycle-based verification environment. Said method comprises the steps of providing (10) a VHDL description of the digital circuit design, performing (12) a logic synthesis, wherein the VHDL description is turned into a design implementation in terms of logic gates, and creating (14) a netlist including the elements of the digital circuit design and the connections between said elements. Said method comprises the further steps of providing (28) a transformation script with at least one transparent storage element (40; 54), wherein said transparent storage element (40; 54) represents a path delay within the digital circuit design, creating (30) a new netlist with the at least one transparent storage elements (40; 54), running (20) a verification, and checking, if the new netlist is clean from a logical and timing point of view.Type: ApplicationFiled: September 18, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juergen Koehl, Walter Pietschmann, Juergen Saalmueller, Norbert Schumacher, Volker Urban, Joerg Walter
-
Publication number: 20090083749Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.Type: ApplicationFiled: December 2, 2008Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas E. Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil A. Katz, Michael Mirt, Victor S. Moore
-
Publication number: 20090083529Abstract: A memory switching data processing system including one or more central processing units (‘CPUs’); random access memory organized in at least two banks of memory modules; one or more memory buses providing communications paths for data among the CPUs and the memory modules; and a flexibly configurable memory bus switch comprising a first configuration adapting the first CPU to a first bank of memory modules and a second CPU to a second bank of memory modules and a second configuration adapting the first CPU to both the first bank of memory modules and the second bank of memory modules.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Justin P. Bandholz, Zachary B. Durham, Clifton E. Kerr, Joseph E. Maxwell, Kevin M. Reinberg, Kevin S.D. Vernon, Philip L. Weinstein, Christopher C. West
-
Publication number: 20090080656Abstract: Performing cryptographic provider failover utilizing an integrated cryptographic provider to register for each of a plurality of service type—algorithm pairs already registered by each of a plurality of underlying cryptographic providers, such that the integrated cryptographic provider specifies failover support for all registered service type—algorithm pairs using the one or more underlying cryptographic providers. Upon receipt of a first security request, the integrated cryptographic provider constructs a table including a list of cryptographic providers for each of the plurality of service type—algorithm pairs, wherein the table identifies a temporal order in which two or more of the plurality of underlying cryptographic providers were registered for each of the plurality of service type—algorithm pairs.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINE CORPORATIONInventors: Sarah Blodgett Hughes, Jason Greg Katonica
-
Publication number: 20090080032Abstract: A method and system is provided for forming a three-dimensional image and, more particularly, for making three-dimensional digital image transfer thermoformed objects on, e.g., generic molds. The method includes manipulating digital images of a subject into a single image; printing the single image onto a media; and thermoforming the media with the single image using a generic mold. The system comprises a computer infrastructure operable to: receive images of a subject; display the images; stitch together the images to form a single image; adjust portions of the images or single image to compensate for deformation during thermoforming of the single image; register the single image with points on a mold; and print the single image.Type: ApplicationFiled: September 25, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Lyle S. Simons
-
Publication number: 20090083533Abstract: A method for configuring functional capabilities in a data processing system. An intermediate link record and a System Anchor record containing the unchangeable hardware ID are used. All entitlement records are then linked to the System Anchor record. Only the System Anchor record links to the unchangeable hardware ID. It contains a system unique ID. The entitlement records link to the System anchor record via the system unique ID. The repair (or upgrade) situation with the exchange of a hardware component now becomes much simpler: There is no exchange of any asset protection record (neither System Anchor record nor entitlement record) required as long as the hardware component comprising the asset protection record is not exchanged. In case the hardware component comprising the asset protection record needs to be exchanged the System Anchor record only must be exchanged but all the entitlement records can stay unchanged.Type: ApplicationFiled: September 16, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Christine Axnix, Juergen Probst
-
Publication number: 20090078997Abstract: A first high-k gate dielectric layer and a first metal gate layer are formed on first and second semiconductor fins. A first metal gate ring is formed on the first semiconductor fin. In one embodiment, the first high-k gate dielectric layer remains on the second semiconductor fin. A second metal gate layer and a silicon containing layer are deposited and patterned to form gate electrodes. In another embodiment, a second high-k dielectric layer replaces the first high-k dielectric layer over the second semiconductor fin, followed by formation of a second metal gate layer. A first electrode comprising a first gate dielectric and a first metal gate is formed on the first semiconductor fin, while a second electrode comprising a second gate dielectric and a second metal gate is formed on the second semiconductor fin. Absence of high-k gate dielectric materials on a gate wiring prevents increase in parasitic resistance.Type: ApplicationFiled: September 25, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian J. Greene, Mahender Kumar
-
Publication number: 20090080165Abstract: A modular electronic system including a mechanism for releasably securing a modular device within a chassis, and for facilitating insertion and removal of the modular device. One embodiment provides a modular device that includes a handle secured to opposing pivotable lever arms. A follower pin secured to one end of the lever arms rides in a slot defined by the chassis. The slot is arranged so that pulling upward on the handle moves the follower pin in one direction along the slot to urge the modular device in a direction further into the device bay, and pushing downward on the handle urges the modular device in a direction out of the device bay, thereby providing a mechanical advantage to the user. When the modular device is fully inserted, retractable locking members provided on the modular device move into windows provided on the chassis, to releasably lock the modular device in the device bay.Type: ApplicationFiled: September 20, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard M. Barina, Derek Ian Schmidt, James Scott Womble
-
Publication number: 20090081995Abstract: A system for implementing intelligent consumer earcons, includes: one or more communication devices for carrying out conversations between users and for playing of earcons; one or more tracking and monitoring devices; one or more servers configured with software for implementing the earcons; one or more storage devices for storing a database of earcons, and for storing user profile and preference databases; one or more networks configured for signal communication between the communication devices, the tracking and monitoring devices, the servers, and the storage devices; wherein the monitoring devices are configured to monitor the user, user audio content, and the user's environment; wherein the earcons are chosen from the database of earcons based on the user profile and preferences database; and wherein the playing of individual earcons from the database of earcons is based on the monitored user audio content and environment.Type: ApplicationFiled: September 25, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINE CORPORATIONInventors: Sara H. Basson, Ramesh Gopinath, Dimitri Kanevsky, Edward E. Kelley
-
Publication number: 20090083302Abstract: The present invention discloses a solution for establishing position values of new items in an ordered list at either the start or the end of the list without using of markers and without needing to query all the items of the list. In the solution, a command to add a new item to the ordered list can be received, which specifies whether the item is to be added at the start or the end of the list. When the item is to be added to the end of a list, an item position value for a new item can be set equal to a current value of a time element. Otherwise, it can be set equal to negative one times the current value of the time element (assuming smallest to largest ordering). Mathematical derivates that produce the same effect are contemplated.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MARK C. HAMPTON, ERIC T. MARTINEZ DE MORENTIN, MATTHEW J. PONSFORD, KENNETH S. SABIR
-
Publication number: 20090083501Abstract: Provided are techniques for cancellation of premigration of a member in a chain. A set of premigration messages are received, wherein a separate premigration message is received for each logical volume in a chain of logical volumes. While processing the premigration messages in order of receipt of each of the premigration messages, a cancel message indicating that premigration of a logical volume in the chain is to be cancelled is received. In response to determining that the logical volume whose premigration is to be cancelled has not already been transferred to physical storage media, premigration of the logical volume is cancelled by removing a premigration message for that logical volume from the set of premigration messages and premigration of each other logical volume in the chain of logical volumes is continued in order of receipt.Type: ApplicationFiled: September 24, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cheryl Marie Friauf, Norie Iwasaki, Yuuji Kibuse, Gregory Tad Kishi, Koichi Masuda
-
Publication number: 20090083389Abstract: A method, apparatus, and computer instructions for managing multi-threaded conversations in an instant messaging system. The present invention provides a menu option to allow the start of a new topic of discussion within the current instant messaging session. When a new topic is selected, a new thread of conversation is created within the messaging window that is segregated from previous topics of discussion. This new thread of conversation may be created at all other locations for all of the parties involved in the instant messaging session. In this manner, each party to a messaging session containing multiple conversations may be able to understand which response is related to which thread of conversation. In addition, a menu option may be provided by the instant messaging application to allow a user to merge one or more of the threaded conversations into a single conversation.Type: ApplicationFiled: December 4, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Dustin C. Kirkland, Richard James McCarty, Herman Rodriguez
-
Publication number: 20090080230Abstract: In an embodiment of the present invention, a hierarchical differential sensing approach is effectuated wherein an array of 1T DRAM cells are organized in rows and columns in which the rows represent words and the columns represent bits of the word, each bit column having more than one pair of balanced, true and complement local bit lines, the local bit lines being connected to a pair of balanced, true and complement global bit lines by way of CMOS transistor switches.Type: ApplicationFiled: December 2, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Richard E. Matick, Stanley E. Schuster
-
Publication number: 20090083233Abstract: Techniques are provided for processing a query using an index. It is determined whether a number of consecutive keys that evaluate to a false-positive when applying a screening predicate in the query exceeds a false-positive predefined value. One or more keys in the index are skipped in response to determining that the number of consecutive keys exceeds the false-positive predefined value.Type: ApplicationFiled: November 21, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: You-Chin Fuh, Ping Wang, Li Xia, Binghua Zhen
-
Publication number: 20090082887Abstract: A computer-implemented method of producing a sound recording can begin with receiving an audio signal. The method can continue with displaying the audio signal in a user interface as a waveform. Upon the waveform reaching an end of a line of the user interface, the waveform scrolls to a next line of the user interface. The method can include receiving a section break input. The method can further include beginning a continuation of the waveform on a new line of the user interface in response to receiving the section break input.Type: ApplicationFiled: September 23, 2007Publication date: March 26, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frank L. Jania, Terry Krause, Darren M. Shaw
-
Publication number: 20090083349Abstract: Mechanisms of memory management in a real time runtime environment having a garbage collected memory heap are provided. The runtime environment includes a critical real time thread that is precluded from accessing the garbage collected memory heap. The runtime environment further includes a scoped memory area for the allocation of objects therein for access by the critical real time thread. The mechanisms determine whether the critical real time thread is in a defined state in which a delay associated with garbage collection can be accommodated by the critical thread. The mechanisms further initiate, in response to a determination that the critical real time thread is in the defined state, a process of garbage collection of the scoped memory area.Type: ApplicationFiled: September 23, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventor: Andrew Johnson
-
Publication number: 20090079011Abstract: A method and semiconductor structure that overcome the dual stress liner boundary problem, without significantly increasing the overall size of the integrated circuit, are provided. In accordance with the present invention, the dual stress liner boundary or gap therebetween is forced to land on a neighboring dummy gate region. By forcing the dual stress liner boundary or gap between the liners to land on the dummy gate region, the large stresses associated with the dual stress liner boundary or gap are transferred to the dummy gate region, not the semiconductor substrate. Thus, the impact of the dual stress liner boundary on the nearest neighboring FET is reduced. Additionally, benefits of device variability and packing density are achieved utilizing the present invention.Type: ApplicationFiled: December 4, 2008Publication date: March 26, 2009Applicant: International Business Machines CorporationInventors: Dureseti Chidambarrao, Brian J. Greene