Patents by Inventor Clement Richard Attanasio

Clement Richard Attanasio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6510440
    Abstract: A method and apparatus are disclosed for efficiently creating and maintaining a remembered set in a generational garbage collection scheme using a write buffer and a barrier bit associated with each object. A barrier bit associated with each object differentiates generations in a generational garbage collection scheme. When an object is first created, the barrier bit of the object is set to zero. The barrier bit is set when the object becomes old, for example, after surviving a first garbage collection. The barrier bit is used to determine whether to make an entry into a write buffer when a reference to another object is stored into an object. An entry is made in the write buffer only if the barrier bit of the object that is written into is set. At the end of each garbage collection, entries in the write buffer are added to the remembered set for the next garbage collection if the objects satisfy the criterion for membership, i.e., they are live and may contain pointers to objects in a younger generation.
    Type: Grant
    Filed: January 10, 2000
    Date of Patent: January 21, 2003
    Assignee: International Business Machines Corporation
    Inventors: Bowen Alpern, Clement Richard Attanasio, Stephen Edwin Smith
  • Patent number: 6496866
    Abstract: A TCP-connection-router performs encapsulated clustering by dividing each encapsulated cluster into several Virtual EC (VECs), dynamically distributing incoming connections within a VEC based on current server load metrics according to a configurable policy. In one embodiment, the connection router supports dynamic configuration of the cluster, and enables transparent recovery which provides uninterrupted service to the VEC clients.
    Type: Grant
    Filed: April 9, 1999
    Date of Patent: December 17, 2002
    Assignee: International Business Machines Corporation
    Inventors: Clement Richard Attanasio, German Sergio Goldszmidt, Guerney-Douglass Holloway Hunt, Stephen Edwin Smith
  • Publication number: 20020166080
    Abstract: An object, of this invention is to improve the overall throughput of an Encapsulated Cluster.
    Type: Application
    Filed: April 9, 1999
    Publication date: November 7, 2002
    Inventors: CLEMENT RICHARD ATTANASIO, GUERNEY-DOUGLASS HALLOWAY HUNT, STEPHEN EDWIN SMITH, GERMAN SERGIO GOLDSZMIDT
  • Patent number: 6470361
    Abstract: A method and apparatus are provided for the efficient management of remembered sets in a generational garbage collection scheme. The present invention detects when an old object has a pointer to a young object, and needs to be added to the remembered set. A write buffer and a temporary buffer are used to create and maintain the remembered set. Entries in the write and temporary buffers are used as part of the root set for creating the remembered set for the next garbage collection. A barrier bit associated with each object differentiates generations in the generational garbage collection scheme and is used to determine whether to make an entry into a write buffer when a reference to another object is stored into an object. Objects that have survived one or more collections, but not the minimum number, N, of collections to be considered an old object are referred to as “middle-aged” objects. During a minor garbage collection, the write buffer is scanned.
    Type: Grant
    Filed: January 10, 2000
    Date of Patent: October 22, 2002
    Assignee: International Business Machines Corporation
    Inventors: Bowen Alpern, Clement Richard Attanasio, Stephen Edwin Smith
  • Patent number: 6226653
    Abstract: A method and apparatus are provided for the efficient management of remembered sets in a generational garbage collection scheme. In order to manage the remembered set, the present invention provides a first mechanism for detecting when an old object has a pointer to a young object, and needs to be added to the remembered set, and a second mechanism for detecting when an object already in the remembered set no longer contains a pointer to a young object, so that the object can be removed from the remembered set. Entries in the remembered set have an associated counter, C, identifying the garbage collection cycle during which the object was placed in the remembered set. Objects inserted into the remembered set are assumed to point to the youngest possible object. Entries automatically expire from the remembered set when the garbage collection counter reaches C+N, since the objects pointed to by the object in the remembered set must now themselves be old objects.
    Type: Grant
    Filed: January 10, 2000
    Date of Patent: May 1, 2001
    Assignee: International Business Machines Corporation
    Inventors: Bowen Alpern, Clement Richard Attanasio, Stephen Edwin Smith
  • Patent number: 5918017
    Abstract: A TCP-connection-router performs encapsulated clustering by dividing each encapsulated cluster into several Virtual EC (VECs), dynamically distributing incoming connections within a VEC based on current server load metrics according to a configurable policy. In one embodiment, the connection router supports dynamic configuration of the cluster, and enables transparent recovery which provides uninterrupted service to the VEC clients.
    Type: Grant
    Filed: August 23, 1996
    Date of Patent: June 29, 1999
    Assignee: Internatioinal Business Machines Corp.
    Inventors: Clement Richard Attanasio, German Sergio Goldszmidt, Guerney Douglas Holloway Hunt, Stephen Edwin Smith
  • Patent number: 5668943
    Abstract: A system and method for recovering from failures in the disk access path of a clustered computing system. Each node of the clustered computing system is provided with proxy software for handling physical disk access requests from applications executing on the node and for directing the disk access requests to an appropriate server to which the disk is physically attached. The proxy software on each node maintains state information for all pending requests originating from that node. In response to detection of a failure along the disk access path, the proxy software on all of the nodes directs all further requests for disk access to a secondary node physically attached to the same disk.
    Type: Grant
    Filed: May 24, 1996
    Date of Patent: September 16, 1997
    Assignee: International Business Machines Corporation
    Inventors: Clement Richard Attanasio, Maria Angela Butrico, James Lyle Peterson, Christos Alkiviadis Polyzois, Stephen Edwin Smith
  • Patent number: 4087856
    Abstract: A computer operating system security mechanism employing a non-penetrable hardware means for storing privileged instruction identification data for preventing direct unauthorized access to certain privileged instructions forming a part of the computer operating system; and further including memory address data boundary storage means for each said privileged instruction for preventing indirect access to such privileged instructions in memory by unauthorized branch instructions. The mechanism includes means associated with the computing system instruction register for recognizing privileged instruction and branch instructions. Storage means are included for each privileged instruction it is desired to protect for storing the address of the privileged instruction itself in memory, and both the upper and lower boundary address in memory relating to each such privileged instruction.
    Type: Grant
    Filed: June 30, 1976
    Date of Patent: May 2, 1978
    Assignee: International Business Machines Corporation
    Inventor: Clement Richard Attanasio
  • Patent number: 3996449
    Abstract: An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification code are respectively stored. A hash function, which is a function of the operating system being loaded and the identification code, is generated by the authenticator. After the operating system is loaded, the hash function is used as an authenticating value and compared with the verifier value for determining the authenticity of the loaded operating system.
    Type: Grant
    Filed: August 25, 1975
    Date of Patent: December 7, 1976
    Assignee: International Business Machines Corporation
    Inventors: Clement Richard Attanasio, Laszlo Antal Belady