Patents by Inventor Mark J. Wolski
Mark J. Wolski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8938588Abstract: Ensuring forward progress of token-required cache operations in a shared cache, including: snooping an instruction to execute a token-required cache operation; determining if a snoop machine is available and if the snoop machine is set to a reservation state; if the snoop machine is available and the snoop machine is in the reservation state, determining whether the instruction to execute the token-required cache operation owns a token or is a joint instruction; if the instruction is a joint instruction, instructing the operation to retry; if the instruction to execute the token-required cache operation owns a token, dispatching a cache controller; determining whether all required cache controllers of relevant compute nodes are available to execute the instruction; executing the instruction if the required cache controllers are available otherwise not executing the instruction.Type: GrantFiled: December 16, 2010Date of Patent: January 20, 2015Assignee: International Business Machines CorporationInventors: Jason A. Cox, Eric F. Robinson, Mark J. Wolski
-
Patent number: 8917904Abstract: A method for vehicle clear path detection using a camera includes imaging a ground area in front of the vehicle with the camera to produce a ground image and analyzing the ground image to formulate a clear path free of objects limiting travel of the vehicle.Type: GrantFiled: April 24, 2008Date of Patent: December 23, 2014Assignee: GM Global Technology Operations LLCInventors: Wende Zhang, Mark J. Wolski
-
Patent number: 8707449Abstract: Acquiring access to a token controlled system resource, including: receiving, by a token broker, a command that requires access to the token controlled system resource, where the token broker is automated computing machinery for acquiring tokens and distributing the command to the token controlled system resource for execution; identifying, by the token broker, a first need state, the first need state indicating that the token broker requires access to the token controlled system resource to which the token broker does not possess a token; requesting, by the token broker, a configurable number of tokens to gain access to the token controlled system resource, without dispatching an operation handler for executing the command until at least one token is acquired; assigning, by the token broker, an acquired token to the operation handler; and dispatching, by the token broker, the operation handler and its assigned token for executing the command.Type: GrantFiled: December 16, 2010Date of Patent: April 22, 2014Assignee: International Business Machines CorporationInventors: Jason A. Cox, Kevin C. Lin, Eric F. Robinson, Mark J. Wolski
-
Patent number: 8671247Abstract: An L2 cache, method and computer program product for transferring an inbound bus operation to a processor side handling machine. The method includes a bus operation handling machine accepting the inbound bus operation received over a system interconnect, the bus operation handling machine identifying a demand operation of the processor side handling machine that will complete the bus operation, the bus operation handling machine sending the identified demand operation to the processor side handling machine, and the processor side handling machine performing the identified demand operation.Type: GrantFiled: December 14, 2010Date of Patent: March 11, 2014Assignee: International Business Machines CorporationInventors: Jason A. Cox, Kevin C K Lin, Eric F. Robinson, Mark J. Wolski
-
Patent number: 8656106Abstract: Methods, apparatuses, and computer program products are disclosed for cache management. Embodiments include receiving, by a cache controller, a request to insert a new cache line into a cache; determining, by the cache controller, whether the new cache line is associated with a forced injection; in response to determining that the new cache line is associated with a forced injection, accepting, by the cache controller, the insertion of the new cache line into the cache; and in response to determining that the new cache line is not associated with a forced injection, determining, by the cache controller, whether to accept the insertion of the new cache line based on a comparison of an address of the new cache line to a predefined range of addresses.Type: GrantFiled: December 16, 2010Date of Patent: February 18, 2014Assignee: International Business Machines CorporationInventors: Jason A. Cox, Praveen G. Karandikar, Eric F. Robinson, Mark J. Wolski
-
Patent number: 8373763Abstract: A system and method for calibrating a camera on a vehicle as the vehicle is being driven. The method includes identifying at least two feature points in at least two camera images from a vehicle that has moved between taking the images. The method then determines a camera translation direction between two camera positions. Following this, the method determines a ground plane in camera coordinates based on the corresponding feature points from the images and the camera translation direction. The method then determines a height of the camera above the ground and a rotation of the camera in vehicle coordinates.Type: GrantFiled: May 22, 2008Date of Patent: February 12, 2013Assignee: GM Global Technology Operations LLCInventors: Wende Zhang, Mark J. Wolski
-
Publication number: 20120159086Abstract: Methods, apparatuses, and computer program products are disclosed for cache management. Embodiments include receiving, by a cache controller, a request to insert a new cache line into a cache; determining, by the cache controller, whether the new cache line is associated with a forced injection; in response to determining that the new cache line is associated with a forced injection, accepting, by the cache controller, the insertion of the new cache line into the cache; and in response to determining that the new cache line is not associated with a forced injection, determining, by the cache controller, whether to accept the insertion of the new cache line based on a comparison of an address of the new cache line to a predefined range of addresses.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Praveen G. Karandikar, Eric F. Robinson, Mark J. Wolski
-
Publication number: 20120159640Abstract: Acquiring access to a token controlled system resource, including: receiving, by a token broker, a command that requires access to the token controlled system resource, where the token broker is automated computing machinery for acquiring tokens and distributing the command to the token controlled system resource for execution; identifying, by the token broker, a first need state, the first need state indicating that the token broker requires access to the token controlled system resource to which the token broker does not possess a token; requesting, by the token broker, a configurable number of tokens to gain access to the token controlled system resource, without dispatching an operation handler for executing the command until at least one token is acquired; assigning, by the token broker, an acquired token to the operation handler; and dispatching, by the token broker, the operation handler and its assigned token for executing the command.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: Internationl Business Machines CorporationInventors: Jason A. Cox, Kevin C. Lin, Eric F. Robinson, Mark J. Wolski
-
Publication number: 20120159087Abstract: Ensuring forward progress of token-required cache operations in a shared cache, including: snooping an instruction to execute a token-required cache operation; determining if a snoop machine is available and if the snoop machine is set to a reservation state; if the snoop machine is available and the snoop machine is in the reservation state, determining whether the instruction to execute the token-required cache operation owns a token or is a joint instruction; if the instruction is a joint instruction, instructing the operation to retry; if the instruction to execute the token-required cache operation owns a token, dispatching a cache controller; determining whether all required cache controllers of relevant compute nodes are available to execute the instruction; executing the instruction if the required cache controllers are available otherwise not executing the instruction.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Eric F. Robinson, Mark J. Wolski
-
Publication number: 20120151142Abstract: An L2 cache, method and computer program product for transferring an inbound bus operation to a processor side handling machine. The method includes a bus operation handling machine accepting the inbound bus operation received over a system interconnect, the bus operation handling machine identifying a demand operation of the processor side handling machine that will complete the bus operation, the bus operation handling machine sending the identified demand operation to the processor side handling machine, and the processor side handling machine performing the identified demand operation.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Kevin CK Lin, Eric F. Robinson, Mark J. Wolski
-
Patent number: 8050459Abstract: A method is provided for detecting a pedestrian exterior to a vehicle by use of a vehicle-mounted image-based monitoring system. An edge-based pedestrian detection analysis is applied to the input image data to determine an edge-based confidence value of a candidate image area being a pedestrian. A motion-based pedestrian detection analysis is applied to the input image data to determine a motion-based confidence value of a candidate image area being a pedestrian. A final confidence value is obtained by combining the edge-based confidence value and motion-based confidence value using weighting factors that are functions of vehicle speed. The final confidence value is compared to a threshold value for determining whether to generate a warning that a pedestrian may be present in the input image data.Type: GrantFiled: July 25, 2008Date of Patent: November 1, 2011Assignee: GM Global Technology Operations LLCInventors: Wende Zhang, Mark J. Wolski
-
Patent number: 7689870Abstract: A method and system for creating trace triggers from non-concurrent events, the system comprising: a trace trigger mechanism including: a plurality of multiplexers for breaking down a plurality of signals into a plurality of groups of signals; a pattern match mechanism for matching the plurality of signals to form a plurality of events, and a trace array trigger control block to perform one or more functions on the plurality of independently controlled events in order to create flexible trace trigger controls from non-concurrent events to control the starting and stopping of a data gathering function such as is used to capture trace data.Type: GrantFiled: November 17, 2006Date of Patent: March 30, 2010Assignee: International Business Machines CorporationInventors: Jason A. Cox, Keith A. DeWeese, Robert J. Dorsey, Eric F. Robinson, Thuong Q. Truong, Mark J. Wolski
-
Publication number: 20100021010Abstract: A method is provided for detecting a pedestrian exterior to a vehicle by use of a vehicle-mounted image-based monitoring system. An edge-based pedestrian detection analysis is applied to the input image data to determine an edge-based confidence value of a candidate image area being a pedestrian. A motion-based pedestrian detection analysis is applied to the input image data to determine a motion-based confidence value of a candidate image area being a pedestrian. A final confidence value is obtained by combining the edge-based confidence value and motion-based confidence value using weighting factors that are functions of vehicle speed. The final confidence value is compared to a threshold value for determining whether to generate a warning that a pedestrian may be present in the input image data.Type: ApplicationFiled: July 25, 2008Publication date: January 28, 2010Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.Inventors: Wende Zhang, Mark J. Wolski
-
Publication number: 20090290032Abstract: A system and method for calibrating a camera on a vehicle as the vehicle is being driven. The method includes identifying at least two feature points in at least two camera images from a vehicle that has moved between taking the images. The method then determines a camera translation direction between two camera positions. Following this, the method determines a ground plane in camera coordinates based on the corresponding feature points from the images and the camera translation direction. The method then determines a height of the camera above the ground and a rotation of the camera in vehicle coordinates.Type: ApplicationFiled: May 22, 2008Publication date: November 26, 2009Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.Inventors: Wende Zhang, Mark J. Wolski
-
Publication number: 20090268946Abstract: A method for vehicle clear path detection using a camera includes imaging a ground area in front of the vehicle with the camera to produce a ground image and analyzing the ground image to formulate a clear path free of objects limiting travel of the vehicle.Type: ApplicationFiled: April 24, 2008Publication date: October 29, 2009Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.Inventors: Wende Zhang, Mark J. Wolski
-
Publication number: 20080120523Abstract: A method and system for creating trace triggers from non-concurrent events, the system comprising: a trace trigger mechanism including: a plurality of multiplexers for breaking down a plurality of signals into a plurality of groups of signals; a pattern match mechanism for matching the plurality of signals to form a plurality of events, and a trace array trigger control block to perform one or more functions on the plurality of independently controlled events in order to create flexible trace trigger controls from non-concurrent events to control the starting and stopping of a data gathering function such as is used to capture trace data.Type: ApplicationFiled: November 17, 2006Publication date: May 22, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Keith A. DeWeese, Robert J. Dorsey, Eric F. Robinson, Thuong Q. Truong, Mark J. Wolski
-
Publication number: 20080091883Abstract: A system for detecting and breaking up requester starvation, including: a plurality of logic circuits, each of the plurality of logic circuits permitted to access a cache via a plurality of requesters for requesting information from the cache; and a counter for counting a number of times each of the plurality of requestors of each of the plurality of logic circuits has (i) successfully accessed one or more of a plurality of arbitration levels and (ii) has been rejected by a subsequent arbitration level; wherein when the counter reaches a predetermined threshold value, an event is triggered to block a first type of requester from accessing the cache and to permit a second type of requester to access the cache; and wherein the counter is reconfigured to count a predetermined number of cycles before the first type of requester is unblocked from accessing the cache.Type: ApplicationFiled: October 12, 2006Publication date: April 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason A. Cox, Eric F. Robinson, Thuong Q. Truong, Mark J. Wolski
-
Publication number: 20080091879Abstract: A system for breaking out of live-locks, the system including: a plurality of central processing units (CPUs), each of the plurality of CPUs having a first level cache; a plurality of second level cache, each of the plurality of second level cache in communication with one or more of the plurality of CPUs; wherein each of the plurality of second level cache includes a plurality of DMs (Data Machines); and wherein the system executes the communication between the plurality of CPUs and the plurality of second level cache by implementing the steps: randomly stopping dispatching of one or more requests; verifying that the plurality of DMs of the second level cache is in an idle state; entering into a single dispatch mode, whereby a DM is dispatched if it is determined that every DM of the second level cache is in the idle state; and returning to normal dispatch mode in a random manner.Type: ApplicationFiled: October 12, 2006Publication date: April 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert J. Dorsey, Jason A. Cox, Eric F. Robinson, Thuong Q. Truong, Mark J. Wolski
-
Patent number: 5285456Abstract: A system and method for verifying the integrity of control information and informational data. One embodiment of the present invention verifies the integrity of control information received from a host computer, and verifies the integrity of this information as it is transmitted throughout the present invention. Another embodiment of the present invention contemplates verifying the integrity of informational data sent from a host computer, verifying the integrity of informational data as it is transmitted throughout the present invention, generating a CRC based upon the informational data and control information, and transmitting the informational data, control information and corresponding CRC to a storage device.Type: GrantFiled: May 15, 1991Date of Patent: February 8, 1994Assignee: International Business Machines CorporationInventors: Dennis P. Cheney, Richard C. Lang, Andrew E. Petruski, Mark J. Wolski, Robert J. Yagley
-
Patent number: 5276808Abstract: A system and method for striping data to multiple storage devices is provided. One embodiment of the present invention sequentially gates data to a plurality of buffers, wherein only those buffers corresponding to storage devices in use are induced to gate in data. The data is then sent to the storage devices in parallel. Other embodiments further include the use of striping buffers alternatingly used to gate in data, and transfer data to the storage devices.Type: GrantFiled: February 4, 1991Date of Patent: January 4, 1994Assignee: International Business Machines CorporationInventors: Dennis P. Cheney, Robert J. Yagley, Jr., Mark J. Wolski, Andrew E. Petruski, Josephine A. Boston