Patents by Inventor Darrell Reimer

Darrell Reimer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200242510
    Abstract: A system, apparatus and a method for constructing pipelines, including enumerate a subspace of valid integrated pipelines, collecting a set of metrics for each of the plurality of pipelines, reducing the set of metrics to a single metric, selecting a final integrated pipeline from among the valid integrate pipelines based on reduced metric.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Inventors: Evelyn Duesterwald, Martin Hirzel, Darrell Reimer
  • Patent number: 9501334
    Abstract: A system and method are provided for communicating information in a data structure between applications. According to the method, a description of a data structure is sent from a first application to a second application, and there is received from the second application an identification of at least one portion of the data structure that is requested by the second application. The first application marshals a subset of the data structure consisting of the at least one portion that was identified, and there is sent from the first application to the second application the marshalled subset of the data structure.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: November 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Stephen J. Fink, Alan A. Donovan, Darrell Reimer, Mark N. Wegman
  • Publication number: 20080271055
    Abstract: A system and method are provided for communicating information in a data structure between applications. According to the method, a description of a data structure is sent from a first application to a second application, and there is received from the second application an identification of at least one portion of the data structure that is requested by the second application. The first application marshals a subset of the data structure consisting of the at least one portion that was identified, and there is sent from the first application to the second application the marshalled subset of the data structure.
    Type: Application
    Filed: June 27, 2008
    Publication date: October 30, 2008
    Applicant: International Business Machines Corp.
    Inventors: Stephen J. Fink, Alan A. Donovan, Darrell Reimer, Mark N. Wegman
  • Publication number: 20070179964
    Abstract: A system and method are provided for communicating information in a data structure between applications. According to the method, a description of a data structure is sent from a first application to a second application, and there is received from the second application an identification of at least one portion of the data structure that is requested by the second application. The first application marshals a subset of the data structure consisting of the at least one portion that was identified, and there is sent from the first application to the second application the marshalled subset of the data structure.
    Type: Application
    Filed: January 6, 2006
    Publication date: August 2, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stephen Fink, Alan Donovan, Darrell Reimer, Mark Wegman
  • Publication number: 20070169124
    Abstract: A method, system and program product for minimizing unwanted synchronizations in a multithreading program. Program functions in a multithreading program that should not be synchronized are identified as input tails, e.g., manually identified. An invocation graph is constructed for the multithreading program with nodes identified as head nodes and tail nodes that correspond to the input tails. Synchronization information is collected for each node of the invocation graph. Sources of synchronization in the invocation graph are represented as source nodes. All paths from head nodes to tail nodes through at least one source node are identified.
    Type: Application
    Filed: November 10, 2005
    Publication date: July 19, 2007
    Inventors: Aaron Kershenbaum, Lawrence Koved, George Leeman, Darrell Reimer
  • Publication number: 20060106772
    Abstract: A method for regulating communication of information in a data structure between components of a computer program is disclosed. The method includes reading a computer program and automatically identifying fields of a data structure that must be transmitted from a first component of the computer program to a second component of the computer program. The method further includes generating a routine that indicates the fields of the data structure that were identified. The method further includes requiring the first component to execute the routine when sending the data structure to the second component, such that the first component only marshals the fields of the data structure that are indicated by the routine.
    Type: Application
    Filed: November 15, 2004
    Publication date: May 18, 2006
    Inventors: Alan Donovan, Stephen Fink, Darrell Reimer
  • Publication number: 20060106771
    Abstract: A method for communicating information in a data structure between applications includes receiving a request from a first application for sending information in a data structure to a second application. The method further includes reading information from a run-time environment of the first application and identifying, based on the information, portions of the data structure to send. The method further includes marshalling the portions of the data structure that were identified and sending the portions of the data structure that were marshalled to the second application.
    Type: Application
    Filed: November 15, 2004
    Publication date: May 18, 2006
    Inventors: Alan Donovan, Stephen Fink, Darrell Reimer
  • Publication number: 20050251804
    Abstract: A method, computer program product, and a data processing system for identifying a shared resource usage violation in a data processing system is provided. A set of resources are assigned to a resource group. A usage policy is defined that is associated with the resource group. A usage state associated with a resource of the resource group is compared with a threshold defined by a policy associated with the resource group. A determination is made if usage of the resource is in violation of the policy.
    Type: Application
    Filed: May 4, 2004
    Publication date: November 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Musta, Darrell Reimer, David Zavala
  • Publication number: 20050071820
    Abstract: Disclosed are a tool and method for monitoring the behavior of a running computer program. The tool observes the behavior of a running program within the context of a large number of defined coding patterns, and automatically flags violations of the coding patterns when they occur. These defined coding patterns can include best practice patterns and problematic coding patterns. The tool, in the preferred embodiment of the invention, does this using a standard debugger to enforce the best practices rules. This is advantageous because debuggers contain the type of information needed both to enforce the rules and to explain the violations of the rules. Moreover, because debuggers are standard tools in developers' arsenal, little or no additional training is required for the user of the tool to detect subtle software defects.
    Type: Application
    Filed: September 25, 2003
    Publication date: March 31, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kavitha Srinivas, Darrell Reimer
  • Publication number: 20050071813
    Abstract: The present invention provides a method, apparatus, and computer instructions for program analysis. In an exemplary embodiment, a target program is loaded onto a data processing system including a program analysis software component. Hierarchies in the form of control flow and containment information about the target program are determined, using either static or dynamic, and direct (e.g., instrumented profilers) or indirect (e.g., monitored runtime), processing techniques, depending on the application and program analysis tool being used. The control flow and object containment information are then presented in a related and selected format for consideration by a user. One embodiment includes a program and GUI (graphical user interface) operably providing control flow-annotated object containment hierarchies to a user, the hierarchies including control flow, allocation and storage information added to object containment information.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Inventors: Darrell Reimer, Kavitha Srinivas
  • Publication number: 20050015752
    Abstract: A system and method for providing “static analysis” of programs to aid in improving runtime performance, stability, security and privacy characteristics of deployed application code. The method includes performing a set of analyses that sifts through the program code and identifies programming security and/or privacy model coding errors. In particular the invention focuses on identifying coding errors that cause loss of correctness, performance degradation, security, privacy and maintainability vulnerabilities. A deep analysis of the program is performed using detailed control and data flow analyses. These deeper analyses provide a much better perspective of the overall application behavior. This deep analysis is in contrast to shallow analyses in current industry tools, which inspect or model a single or a few classes at a time.
    Type: Application
    Filed: July 15, 2003
    Publication date: January 20, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bowen Alpern, Robert Johnson, Aaron Kershenbaum, Lawrence Koved, George Leeman, Marco Pistoia, Darrell Reimer, Kavitha Srinivas, Harini Srinivasan
  • Patent number: 6769113
    Abstract: An enterprise process model that comprises a plurality of actors, actions performed by said actors, objects acted upon by said actions, and roles. Data characterizing the view of the attributes of at least one of the objects of the model is generated by associating a plurality of situation/role pairs with the at least one object; and then, for each particular situation/role pair, defining a view definition for subsequent use. In another aspect of the present invention, an enterprise application for use in an information system that comprises diverse software services and hardware platforms is generated by providing a model of the enterprise process, wherein the model comprises a plurality of actors, actions performed by said actors, objects acted upon by said actions, and roles. A configuration defining software services and hardware platforms that support the model is generated. Finally, program fragments that support the model are generated.
    Type: Grant
    Filed: December 15, 1999
    Date of Patent: July 27, 2004
    Assignee: International Business Machines Corporation
    Inventors: Bard Bloom, Darrell Reimer, Ian D. Simmonds, Mark N. Wegman
  • Patent number: 6732353
    Abstract: An enterprise process model that comprises a plurality of actors, actions performed by said actors, objects acted upon by said actions, and roles. Data characterizing the view of the attributes of at least one of the objects of the model is generated by associating a plurality of situation/role pairs with the at least one object; and then, for each particular situation/role pair, defining a view definition for subsequent use. In another aspect of the present invention, an enterprise application for use in an information system that comprises diverse software services and hardware platforms is generated by providing a model of the enterprise process, wherein the model comprises a plurality of actors, actions performed by said actors, objects acted upon by said actions, and roles. A configuration defining software services and hardware platforms that support the model is generated. Finally, program fragments that support the model are generated.
    Type: Grant
    Filed: December 15, 1999
    Date of Patent: May 4, 2004
    Assignee: International Business Machines Corporation
    Inventors: Bard Bloom, Darrell Reimer, Ian D. Simmonds, Mark N. Wegman