Techniques including methods, apparatus and computer program products are disclosed. These techniques include computer instructions that are encoded on computer storage media for determining wettability. The techniques use a numerical aging computation process to provide a representation of a wettability alteration of a physical rock sample in the presence of at least two fluids is disclosed. The techniques include retrieving a representation of a physical rock sample, the representation including pore space and grain space data corresponding to the physical rock sample, calculating local curvature for each surface in the pore space, determining from the calculated local curvature whether water-film breakage will occur, and classifying the wettability of the physical rock based on the determination of water-film breakage.
G01N 13/00 - Recherche des effets de surface ou de couche limite, p. ex. pouvoir mouillantRecherche des effets de diffusionAnalyse des matériaux en déterminant les effets superficiels, limites ou de diffusion
G01N 23/046 - Recherche ou analyse des matériaux par l'utilisation de rayonnement [ondes ou particules], p. ex. rayons X ou neutrons, non couvertes par les groupes , ou en transmettant la radiation à travers le matériau et formant des images des matériaux en utilisant la tomographie, p. ex. la tomographie informatisée
The description describes one or more processing devices and one or more hardware storage devices storing instructions that are operable, when executed by the one or more processing devices, to cause the one or more processing devices to perform operations including modeling the porous material as a two-dimensional interface, in a simulation space, in which fluid flows and sound waves travel through the porous material and experience pressure and acoustic losses. The operations also include simulating, in the simulation space, fluid flow and propagation of sound waves, the activity of the fluid being simulated so as to simulate movement of elements within the simulation space and across the interface, where the simulation of the movement of the elements across the interface is governed by the model.
A method, system, and computer program product for correcting the contrast levels of a medical image of a vascular system is described. One of the methods includes identifying a global reference contrast level. The method includes for each image location which represents a location within the vascular system, determining a corrected contrast level by multiplying the original contrast level of that location by the ratio of the global reference contrast level divided by a local reference contrast level.
A61B 6/00 - Appareils ou dispositifs pour le diagnostic par radiationsAppareils ou dispositifs pour le diagnostic par radiations combinés avec un équipement de thérapie par radiations
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
Systems, methods, and computer program products can be used for visualizing the behavior of flow of two or more fluid phases, wherein a fluid phase behavior is represented in a visualization. One of the methods includes determining an occupation time, which is the amount of elapsed time from when a fluid phase first occupies a particular location until a second time. The method includes generating data for a visualization, with a location in the visualization corresponding to the particular location, and with the generated data for that location in the visualization indicating the occupation time.
G01F 1/704 - Mesure du débit volumétrique ou du débit massique d'un fluide ou d'un matériau solide fluent, dans laquelle le fluide passe à travers un compteur par un écoulement continu utilisant des zones marquées ou non homogènes de l’écoulement de fluide, p. ex. des variations statistiques d'un paramètre du fluide
G01F 1/74 - Dispositifs pour la mesure du débit d'un matériau fluide ou du débit d'un matériau solide fluent en suspension dans un autre fluide
G06G 7/57 - Calculateurs analogiques pour des procédés, des systèmes ou des dispositifs spécifiques, p. ex. simulateurs d'écoulement de fluide
A system and method for simulating activity of a fluid in a volume that represents a physical space, the activity of the fluid in the volume being simulated so as to model movement of elements within the volume. The method includes at a first time, identifying a first set of vortices in a transient and turbulent flow. The method includes at a second time that is subsequent to the first time, identifying a second set of vortices. The method includes tracking changes in the vortices by comparing the first set and the second set of discrete vortices. The method includes identifying one or more noise sources based on the tracking. The method includes determining the contribution of one or more noise sources at a receiver. The method also includes outputting data indicating one or more modifications to one or more geometric features of a device or an entity.
G01H 17/00 - Mesure des vibrations mécaniques ou des ondes ultrasonores, sonores ou infrasonores non prévue dans les autres groupes de la présente sous-classe
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for the generation and use of a fast battery model. One of the methods includes obtaining temperature data, for one or more locations within or on the surface of a battery, the temperature data comprising time-varying heat flow inputs applied to the battery and time-varying temperature signals generated by the battery. The method also includes processing the temperature data to generate a continuous-time thermal model having one or more time-delay elements and one or more parameters, wherein parameter values are fitted using the temperature data.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for the generation and use of an electro-thermal battery model. One of the methods includes obtaining battery data comprising voltage values, with each voltage value corresponding to an operating state of the battery. The method includes selecting a battery model having convex parameters and non-convex parameters. The method includes processing the battery data by performing a fitting procedure to determine values of the convex parameters and non-convex parameters. The fitting procedure includes fitting the convex parameters with respect to the battery data during which the non-convex parameters are held fixed. The fitting procedure includes fitting the non-convex parameters with respect to the battery data. The fitting procedure also includes creating an electro-thermal model for a battery from the selected battery model using the fitted values.
G01R 31/36 - Dispositions pour le test, la mesure ou la surveillance de l’état électrique d’accumulateurs ou de batteries, p. ex. de la capacité ou de l’état de charge
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
G01K 7/42 - Circuits pour la compensation de l’inertie thermiqueCircuits pour prévoir la valeur stationnaire de la température
H01M 10/05 - Accumulateurs à électrolyte non aqueux
H01M 10/48 - Accumulateurs combinés à des dispositions pour mesurer, tester ou indiquer l'état des éléments, p. ex. le niveau ou la densité de l'électrolyte
8.
A DATA PROCESSING METHOD FOR INCLUDING THE EFFECT OF THE TORTUOSITY ON THE ACOUSTIC BEHAVIOR OF A FLUID IN A POROUS MEDIUM
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing data representing the effect of tortuosity on the acoustic behavior of a fluid in a porous medium. One of the methods includes generating by a first data processing program of the data processing apparatus, a model of acoustic behavior of a fluid in a porous medium including an effect of tortuosity, with the model comprising a time variable indicative of a sound speed of the fluid. The method includes rescaling the time variable of the model based on the sound speed in a fluid in the porous medium. The method also includes simulating the acoustic behavior including the effect of tortuosity of the porous medium based on the rescaling of the time-related variables within the model.
G06G 7/48 - Calculateurs analogiques pour des procédés, des systèmes ou des dispositifs spécifiques, p. ex. simulateurs
G06G 7/60 - Calculateurs analogiques pour des procédés, des systèmes ou des dispositifs spécifiques, p. ex. simulateurs d'êtres vivants, p. ex. leur système nerveux
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing data in a data processing system to identify candidate modifications to physical features of a mechanical device. One of the methods includes converting a representation of the mechanical device into a representation of surface elements. The method includes that based on the representation of the surface elements, computing an effect to evaluation criteria of each of a design variable. The method includes converting the design variables and the computed effect into component vectors. The method includes computing a composite design vector for the evaluation criteria using the component vectors, with the composite design vector comprising a combination of design variable settings to improve the evaluation criteria, and specifying a vector in a design variable space. The method also includes generating a physical modification specification for the mechanical device based on the composite design vector.
An execution slice circuit for a processor core has multiple parallel instruction execution slices and provides flexible and efficient use of internal resources. The execution slice circuit includes a master execution slice for receiving instructions of a first instruction stream and a slave execution slice for receiving instructions of a second instruction stream and instructions of the first instruction stream that require an execution width greater than a width of the slices. The execution slice circuit also includes a control logic that detects when a first instruction of the first instruction stream has the greater width and controls the slave execution slice to reserve a first issue cycle for issuing the first instruction in parallel across the master execution slice and the slave execution slice.
Embodiments are directed to a computer implemented method of accessing a data sequence, wherein a first portion of the data sequence is in a first memory block, and wherein a second portion of the data sequence is in a second memory block. The method includes initiating, by a processor, an access of the data sequence. The method further includes accessing, by the processor, the first portion of the data sequence. The method further includes, based at least in part on a determination that the processor does not have access to the second memory block, accessing at least one default character as a replacement for accessing the second portion of the data sequence.
G06F 12/06 - Adressage d'un bloc physique de transfert, p. ex. par adresse de base, adressage de modules, extension de l'espace d'adresse, spécialisation de mémoire
G06F 15/80 - Architectures de calculateurs universels à programmes enregistrés comprenant un ensemble d'unités de traitement à commande commune, p. ex. plusieurs processeurs de données à instruction unique
An integrated ΔE-E ionization detector that includes an outer shell having an interior linear axis, a vacuum tube coaxial with the linear axis, and a front cathode, a center anode, and a rear anode disposed within the outer shell and around the vacuum tube. The front cathode, center anode, and rear anode are substantially planar in shape, and a ΔE detection chamber is defined by the front cathode, the center anode, the outer shell, and the vacuum tube, and an E detection chamber is defined by the rear anode, the center anode, the outer shell, and the vacuum tube. All rays defining at least one solid annular angle about the linear axis and originating from a point in front of the front cathode will intersect the front cathode, internally traverse the ΔE detection chamber, intersect the center anode, and traverse at least a portion of the E detection chamber.
G01T 1/185 - Mesure de l'intensité de radiation avec des aménagements de chambre d'ionisation
G01N 23/203 - Recherche ou analyse des matériaux par l'utilisation de rayonnement [ondes ou particules], p. ex. rayons X ou neutrons, non couvertes par les groupes , ou en utilisant la diffraction de la radiation par les matériaux, p. ex. pour rechercher la structure cristallineRecherche ou analyse des matériaux par l'utilisation de rayonnement [ondes ou particules], p. ex. rayons X ou neutrons, non couvertes par les groupes , ou en utilisant la diffusion de la radiation par les matériaux, p. ex. pour rechercher les matériaux non cristallinsRecherche ou analyse des matériaux par l'utilisation de rayonnement [ondes ou particules], p. ex. rayons X ou neutrons, non couvertes par les groupes , ou en utilisant la réflexion de la radiation par les matériaux en mesurant la rétrodiffusion
A method, according to one embodiment, includes selecting, from a buffer, a combination of compressed logical pages of data to maximize an amount of used space in an error correction code container. The method also preferably includes processing the combination of compressed logical pages to generate error correction code data. Furthermore, the method may include writing the data corresponding to the combination of compressed logical pages and the associated error correction code data to a non-volatile random access memory. Other systems, methods, and computer program products are described in additional embodiments.
A method for storing data in a Cloud environment may be provided. The Cloud environment comprises a security layer. The method comprises physically separating the Cloud storage from a key vault system, and receiving a storage request together with a confidentiality rating, wherein the storage request together with data and the confidentiality rating is received via the Cloud storage access interface by the security layer. The method further comprises encrypting the data to be stored and the confidentiality rating on request of the security layer by the key vault system into a data container, categorizing the Cloud storage into Cloud zones, wherein each Cloud zone is assigned a trust level; and storing the data container in one of the Cloud zones of the Cloud storage such that the trust level of the one of the Cloud zones corresponds to the confidentiality rating.
An approach is provided to provide communication between a user and a question answering (QA) system using a persona. A persona-based profile is identified to utilize in a conversation between the user and the QA system with the persona being relevance and/or sentiment based. A question is received at the QA system from the user. The QA system retrieves candidate answers which are compared to the persona-based profile. The candidate answers are scored based on the comparison. One or more of the candidate answers are selected based on the scores and these candidate answers are provided to the user.
Techniques for switching between two (thread and lane) modes of execution in a dual execution mode processor are provided. In one aspect, a method for executing a single instruction stream having alternating serial regions and parallel regions in a same processor is provided. The method includes the steps of: creating a processor architecture having, for each architected thread of the single instruction stream, one set of thread registers, and N sets of lane registers across N lanes; executing instructions in the serial regions of the single instruction stream in a thread mode against the thread registers; executing instructions in the parallel regions of the single instruction stream in a lane mode against the lane registers; and transitioning execution of the single instruction stream from the thread mode to the lane mode or from the lane mode to the thread mode.
The present invention provides a method and apparatus for searching in a database. There is provided a search method, comprising: in response to receiving a search request to search in a database, extracting from the search request a condition for searching in the database; selecting a search algorithm matching the condition from a plurality of search algorithms registered to the database, based on historical statistic data of historical search conducted on the database; and obtaining a search result from the database by using the search algorithm, wherein the database is a time series database. Further, there is provided a method for searching in a database system comprising a time series database and a relational database. By means of the method and apparatus of the present invention, the search efficiency can be increased.
A technique relates sorting entities. The entities are introduced into a nanopillar array. The entities include a first population and a second population, and the nanopillar array includes nanopillars arranged to have a gap separating one from another. The nanopillars are ordered to have an array angle relative to a fluid flow direction. The entities aresorted through the nanopillar array by transporting the first population of the entities less than a predetermined size in a first direction and by transporting the second population of the entities at least the predetermined size in a second direction different from the first direction. The nanopillar array is configured to employ the gap with a gap size less than 300 nanometers in order to sort the entities having a sub-100 nanometer size.
Method and system are provided for publish/subscribe messaging using message structure carried out at a messaging intermediary system. The method includes: maintaining a plurality of lists to which publishing entities can publish messages and to which subscribing entities can subscribe to messages; providing a list for messages conforming, at least partly, to a common message structure; matching a request from a publishing entity or a subscribing entity to one or more provided lists by comparing a message having a message structure or an abstract representation of one or more messages to the provided lists; and sharing messages conforming, at least partly, to the common message structure via the list.
Liquid-cooled heat sink assemblies are provided which include: a thermally conductive base structure having a sidewall surface and a main heat transfer surface; and a manifold structure attached to the base structure, with the base structure residing at least in part within a recess in the manifold structure. Together, the base and manifold structures define a coolant-carrying compartment through which liquid coolant flows, at least in part, in a direction substantially parallel to the main heat transfer surface of the base structure, and at least one of the sidewall surface of the thermally conductive base structure or an opposing surface thereto of the manifold structure includes a continuous groove. A sealing member is disposed, at least in part, within the continuous groove, and provides a fluid-tight seal between the thermally conductive base structure and the manifold structure.
H01L 23/473 - Dispositions pour le refroidissement, le chauffage, la ventilation ou la compensation de la température impliquant le transfert de chaleur par des fluides en circulation par une circulation de liquides
21.
POLYMER COMPOSITE THERMAL INTERFACE MATERIAL WITH HIGH THERMAL CONDUCTIVITY
The present invention relates generally to thermally conductive adhesives for thermal interfaces in electronic packaging, and more particularly, to a polymer-based composite thermal interface material ("TIM") with an inter-penetrating network (IPN) polymer matrix consisting of polyurethane and an epoxy that is fully crosslinked. The IPN polymer matrix is designed to improve overall thermal conductivity by the altering the dispersion/distribution of thermally conductive fillers, the filler/polymer interfaces, and/or phonon scattering behaviors in the composite.
A method, system and computer program product are provided for implementing block extent granularity authorization model processing in Coherent Accelerator Processor Interface (CAPI) adapters. The CAPI adapter includes an authorization table and a file system authorization function to authenticate data access for a client at an extent granularity and to prevent an application from accessing unauthorized data in the CAPI adapter. Each authorization table entry provides for the CAPI client, a CAPI client identification (ID), a CAPI server register space assigning resource ownership to the CAPI client with a CAPI set of allowed functions.
Topology of clusters of processors of a computer configuration, configured to support any of a plurality of cache coherency protocols, is discovered at initialization time to determine which one of the plurality of cache coherency protocols is to be used to handle coherency requests of the configuration
A method for time-shifted uploading of a data file through a backhaul network to a backend provider comprises intercepting an upload request from an originating user located at a network edge. The method further comprises caching the data file associated with the upload request upstream of the backhaul network;uploading a placeholder file to the backend provider; receiving a file ID from the backend provider;mapping the received file ID to the cached data file;intercepting a request to access the data file by a requesting user; sending the requesting user the cached data file; and uploading a copy of the data file to the backend provider based on a backhaul utilization policy.
A method for adhesive bonding in microelectronic device processing is provided that includes bonding a handling wafer to a front side of a device wafer with an adhesive of hydroxystyrene homo polymer and hydroxystyrene acrylate copolymer, styrene maleimide copolymers, or acrylate copolymer; and thinning the device wafer from the backside of the device wafer while the device wafer is adhesively engaged to the handling wafer. After the device wafer has been thinned, the adhesive comprising phenoxy resin may be removed by laser debonding, wherein the device wafer is separated from the handling wafer.
H01L 21/304 - Traitement mécanique, p. ex. meulage, polissage, coupe
C09J 5/00 - Procédés de collage en généralProcédés de collage non prévus ailleurs, p. ex. relatifs aux amorces
C09J 125/04 - Homopolymères ou copolymères du styrène
C09J 133/00 - Adhésifs à base d'homopolymères ou de copolymères de composés possédant un ou plusieurs radicaux aliphatiques non saturés, chacun ne contenant qu'une seule liaison double carbone-carbone et l'un au moins étant terminé par un seul radical carboxyle, ou ses sels, anhydrides, esters, amides, imides ou nitrilesAdhésifs à base de dérivés de tels polymères
H01L 21/02 - Fabrication ou traitement des dispositifs à semi-conducteurs ou de leurs parties constitutives
A method for adhesive bonding in microelectronic device processing is provided that includes bonding a handling wafer to a front side of a device wafer with an adhesive comprising phenoxy resin; and thinning the device wafer from the backside of the device wafer while the device wafer is adhesively engaged to the handling wafer. After the device wafer has been thinned, the adhesive comprising phenoxy resin may be removed by laser debonding, wherein the device wafer is separated from the handling wafer.
The absorption properties of both an adhesive layer and an ablation layer are employed to facilitate debonding of a device wafer and a glass handler without damaging the device wafer. The penetration depths of the adhesive and ablation layers are selected such that no more than a negligible amount of the ablation fluence reaches the surface of the device wafer.
A solar pod system, comprising of an oval transparent enclosure. The oval transparent enclosure encapsulates a circular paraboloidal reflector mounted on solar cell. The solar cell extends over the circular parabolic reflector to place the focus of the paraboloidal reflector on the solar cell, whereby the solar cell receives light reflected by the circular parabolic reflector.
A method for creating a boundless projected interactive virtual desktop, wherein the interactive virtual desktop comprises an adjustable image of a projected portion of an area associated with at least one desktop of a computing device is provided. The method may include integrating a projector and a motion sensor into a device. The method may also include capturing at least one of a location, a change in location, a change in direction, or a change in orientation associated with the device. The method may include computing a projected image. The method may also include coordinating the computed projected image across at least one application running in the device. The method may further include projecting a view of a portion of an area associated with the coordinated projected image, wherein the projected view comprises an interactive virtual desktop. The method may additionally include adjusting the projected view based on a criteria.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G09G 5/00 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation
H04N 5/74 - Dispositifs de projection pour reproduction d'image, p. ex. eidophor
30.
NATURAL LANGUAGE PROCESSING UTILIZING LOGICAL TREE STRUCTURES AND PROPAGATION OF KNOWLEDGE THROUGH LOGICAL PARSE TREE STRUCTURES
Mechanisms are provided for processing logical relationships in natural language content. Natural language content is received,upon which a reasoning operation is to be performed. A first parse representation of the natural language content is generated, by a parser, by performing natural language processing on the natural language content. A logical parse of the first parse is generated by identifying latent logical operators within the first parse indicative of logical relationships between elements of the natural language content. A reasoning operation on the logical parse is executed to generate a knowledge output indicative of knowledge associated with one or more of the logical relationships between elements of the natural language content. The logical parse comprises nodes and edges linking nodes. At least one knowledge value is associated with each node in the logical parse. The at least one knowledge value of at least a subset of the nodes in the logical parse is propagated to one or more other nodes in the logical parse based on propagation rules.
AGENCY FOR SCIENCE, TECHNOLOGY AND RESEARCH (Singapour)
IBM UNITED KINGDOM LIMITED (Royaume‑Uni)
IBM JAPAN LIMITED (Japon)
Inventeur(s)
Engler, Amanda, Catherine
Coady, Daniel, Joseph
Hedrick, James
Yang, Yi Yan
Ke, Xiyu
Abrégé
Water soluble biodegradable polymers were prepared by an organoacid catalyzed ring opening polymerization (ROP) of a cyclic carbonate monomer bearing an active ester side chain. The initial polymer comprising an active ester side chain was treated with an amino-alcohol, which transformed the active ester groups to N-substituted amide groups bearing mono-hydroxy alkyl groups and/or dihydroxy alkyl groups, thereby forming the water soluble polymers. The water- soluble polymers are non-toxic and exhibit stealth properties in buffered serum solution.
A61K 47/34 - Composés macromoléculaires obtenus par des réactions autres que celles faisant intervenir uniquement des liaisons non saturées carbone-carbone, p. ex. polyesters, acides polyaminés, polysiloxanes, polyphosphazines, copolymères de polyalkylène glycol ou de poloxamères
An approach for responding to a threat in a networked computing environment (e.g., a cloud computing environment) is provided. In an embodiment, a set of associations to a virtual machine (VM) instance are established, each association indicating a relationship between the VM instance and a related VM instance. Each of the associations in the set of associations is assigned a strength attribute. When a threat is detected in a VM instance, a first preventative measure is performed on a first related VM instance, the strength of which is determined based on the strength attribute that corresponds to the association between the VM instance and the first related VM instance. A second preventative measure is performed on a second related VM instance, the strength of which is based on the strength attribute that corresponds to the association between the VM instance and the second related VM instance.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
A method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine, determining using a processor whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine, determining using a processor whether the hypervisor is authorized to run the virtual machine using a digital signature of the data structure, receiving a decryption key from a key authority when it is determined that the virtual machine is authorized to be run and it is determined that the hypervisor is authorized to run the virtual machine, unlocking and/or decrypting the virtual machine using the decryption key, and running the virtual machine on a computer system. Other systems, methods, and computer program products are described in additional embodiments.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
34.
EXPEDITING HOST MAINTENANCE MODE IN CLOUD COMPUTING ENVIRONMENTS
A maintenance mode mechanism (MMM)expedites host maintenance in a cloud computing environment by intelligently suspending essentially inactive virtual machines. The user is given the option to enter maintenance mode using the MMM. The MMM determines essentially inactive VMs that can be suspended to reduce the number of VMs that need to be migrated prior to entering a maintenance mode. Metrics of the VMs associated with the host are analyzed to determine which VMs can be suspended. Parameters can also be set by the user to instruct the MMM to verify the selection of a specific VM with the user.
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p. ex. essais de mise en route
G06F 9/46 - Dispositions pour la multiprogrammation
35.
NEGATIVE-TONE RESIST COMPOSITIONS AND MULTIFUNCTIONAL POLYMERS THEREIN
A negative-tone resist composition is provided that contains a free photoacid generator and a multifunctional polymer covalently bound to a photoacid-generating moiety, where the composition is substantially free of cross-linking agents. Multifunctional polymers useful in conjunction with the resist composition are also provided, as is a process for generating a resist image on a substrate using the present compositions and polymers.
Embodiments relate to thread-based cache content savings for task switching in a computer processor. An aspect includes determining a cache entry in a cache of the computer processor that is owned by the first thread, wherein the determination is made based on a hardware thread identifier (ID) of the first thread matching a hardware thread ID in the cache entry. Another aspect includes determining whether the determined cache entry is eligible for prefetching. Yet another aspect includes, based on determining that the determined cache entry is eligible for prefetching, setting a marker in the cache entry to active.
A system, method and computer program product for electronically signing documents on mobile devices. An example method includes receiving an electronic document at a mobile device. The mobile device indicates to a user of the mobile device to sign the electronic document by moving the mobile device through physical space in a trajectory of the user's signature. A recording step records the trajectory of the user's signature from a sensor at the mobile device, such as an accelerometer and/or a camera. A converting step converts the trajectory of the user's signature into an electronic signature object. The signature object is then combined with the electronic document to create a signed electronic document.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
H04M 1/00 - Équipement de sous-station, p. ex. pour utilisation par l'abonné
38.
SYNCHRONIZING OPERATIONS BETWEEN REGIONS WHEN A NETWORK CONNECTION FAILS
Method and system are provided for synchronizing operations. The system includes a first recovery management connector at a first region of the transaction processing system which carries out the steps of: identifying a failure of a network connection during synchronization operations with a partner region; querying connections defined to the transaction processing system to identify a replacement connection that is connected to the partner region using a different network type to the failed network connection, the replacement connection having a second recovery management connector in the first region; collecting relevant data for an interrupted synchronization operation; issuing a command to link to a specific program at a first recovery management connector in the partner region, the command including the relevant data for the interrupted synchronization operation; and using the second recovery management connector at the first region to communicate the command and a response from the partner region via the replacement connection in order to continue the interrupted synchronization operation.
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 11/16 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel
39.
HASH-BASED MULTI-TENANCY IN A DEDUPLICATION SYSTEM
In a hash-based multi-tenancy in a deduplication system, incorporating, as if part of input data, a tenant identification (ID) into a hash value calculation using a single hash based index table for separating data segments in a multi-tenant deduplication system.
Embodiments of the invention relate to a hard disk drive (HDD) formatted with at least two surfaces, each of the surfaces serviced a write head, each write head configured for the respective surface. At least one of the surfaces of the HDD is serviced by a random block overwrite (RBO) head for an associated surface. Similarly, at least one of the surfaces of the HDD is serviced by a shingled magnetic recording (SMR) head for an associated SMR surface. The properties of both the RBO and SMR surfaces are retained, and at the same time leveraged to maximize data density and write performance in a single HDD.
Translocation events are sensed using composite nanopore assemblies including nanopores formed in graphene sheets. Single molecule detection and characterization and multi-molecule characterization and identification are provided using such assemblies. Multiple electrodes associated with nanofluidic sensors facilitate detection of ionic current through a nanopore as well as tunneling currents. Current signals of individual molecules are estimated from the combination of an ionic current signal through the nanopore and tunneling current signals obtained at specific locations within the nanopore.
There are provided a transparent performance enhancing proxy, a method for operating a transparent performance enhancing proxy between a source device and a destination device, and corresponding computer program product. The method includes preserving, without translation, packet header information of a header for a packet received from the source device to be forwarded to the destination device. The method further includes during a transmission control protocol connection setup phase for the packet, preserving transmission control protocol connection semantics. The method also includes during a transmission control protocol data transfer phase for the packet, running a transmission control protocol by masquerading as the source device to the destination device and masquerading as the destination device to the source device to transmit the packet to the destination device with the preserved packet header information.
A technique relates to flash-optimized data layout of a dataset for queries. Selection columns are stored in flash memory according to a selection optimized layout, where the selection optimized layout is configured to optimize predicate matching and data skipping. The selection optimized layout, for each selection column, is formed by storing a selection column dictionary filled with unique data values in a given selection column, where the unique data values are stored in sorted order in the selection column dictionary. Row position designations are stored corresponding to each row position that the unique data values are present within the given selection column, without duplicating storage of any of the unique data values that occur more than once in the given selection column.
An illustrative embodiment of a computer-implemented method for correlating artifacts between a versioned domain and an un-versioned domain, generates metadata having attributes of both of the versioned domain and the un-versioned domains, for an artifact in a set of artifacts; creates an instance using a specific version of a versioned artifact definition, wherein the instance comprises a first part directly created from the versioned artifact definition and a second part created from an un-versioned artifact definition; specifies linkages between a respective representation of the artifact in the versioned domain and the un-versioned domain; provides a set of facades through which a selected one of author, execute and update instances of the artifact is performed using either the versioned domain or the un-versioned domain; and correlates all versions of the artifact definition to a single un-versioned definition.
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
45.
SELECTING A HOST FOR A VIRTUAL MACHINE USING A HARDWARE MULTITHREADING PARAMETER
A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by CPUs on the host computer systems. The cloud manager receives a request to provision a virtual machine (VM) that includes a hardware multithreading parameter that specifies the amount of hardware multithreading required on the host computer system. The cloud manager then selects a host computer system for the VM taking the hardware multithreading parameter into consideration.
A synchronization capability to synchronize updates to page tables by forcing updates in cached entries to be made visible in memory (i.e., in in-memory page table entries). A synchronization instruction is used that ensures after the instruction has completed that updates to the cached entries that occurred prior to the synchronization instruction are made visible in memory. Synchronization may be used to facilitate memory management operations, such as bulk operations used to change a large section of memory to read-only, operations to manage a free list of memory pages, and/or operations associated with terminating processes.
Automatically generating a semantic mapping for a relational database RDB, comprising: obtaining a first semantic mapping from a first RDB to an ontology of linked data; obtaining a schema mapping from the first RDB to a second RDB; and generating a second semantic mapping from the second RDB to the ontology of the linked data based on the first semantic mapping and the schema mapping. Through this method and system, the efficiency of generating a semantic mapping for a relational database may be effectively improved.
A request to invoke a text-list definition of a componentized application is received. The text-list definition of the componentized application identifies a collection of different listed independent application sub-components specified by a user to be executed as a set. A componentized user interface is created with a different user interface component associated with each of the different listed independent application sub-components within the text-list definition of the componentized application. The different listed independent application sub-components are independently accessed based upon user inputs received in association with the respective different user interface component associated with each of the different listed independent application components within the text-list definition of the componentized application.
There is provided an apparatus, a method and computer program product for managing one or more components of an electronic machine. A user connects one or more components to an electronic machine in parallel. The electronic machine determines whether the components are failed. A latch device, attached to each component, automatically locks one or more of the components to the electronic machine if the one or more of the components are not failed. The electromechanical latch automatically releases the one or more of the components from the electronic machine if the one or more of the components are failed.
Pretreatment of an etch chamber for performing a silicon etch process and Bosch process can be effected by running a deposition process employing C5HF7, or by running an alternating deposition and etch process employing C5H2F6 and SF6. It has been discovered that the pretreatment of the etch chamber for the silicon etch process can enhance the etch rate of silicon by at least 50% without adverse effect on etch profile during a first each process following the pretreatment, while the etch rate enhancement factor decreases over time. By periodically performing the pretreatment in the etch chamber, the throughput of the etch chamber can be increased without adversely impacting the etch profile of the processed substrates.
Interface management techniques provide reduced power consumption along with reducing heat and EMI generation in a computer system having multiple interconnected processing units. Physical link layers of external interfaces that interconnect the processing units have dynamically adjustable bandwidth provided by anadjustable width and adjustable operating frequency. The bandwidths may be dynamically adjusted by predicting interface bandwidth requirements. From a required bandwidth, an active width and an operating frequency for the physical link layers are determined and set. The interface is operated according to the determined width and operating frequency.
G06F 13/42 - Protocole de transfert pour bus, p. ex. liaisonSynchronisation
G06F 13/38 - Transfert d'informations, p. ex. sur un bus
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
52.
PARTITION MOBILITY FOR PARTITIONS WITH EXTENDED CODE
A partition mobility facility in which a partition that is executing one or more applications that have optimized code with one or more extended features is to be moved from a source system to a target system. If the target system does not support the extended mode features, then action is taken to remove the code having those features to facilitate migration.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A wireless packet switch and methods for controlling the same include a multiple port controllers, each in communication with a respective wireless transceiver, configured to analyze data streams to and from the respective wireless transceiver; a cross-connect switch in communication with all of the port controllers, configured to provide connections between respective port controllers; an arbiter, in communication with all of the port controllers and with the cross-connect switch, configured to control the cross-connect switch, such that the cross-connect switch connects data streams of the port controllers in accordance with packet destination information and scheduling information from the port controllers.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for fluid blob tracking. One of the methods includes identifying, by a computer system, a connected fluid phase region in a flow simulation. The method includes tracking, by the computer system, the connected fluid phase region over a first timeframe and a second timeframe. The method also includes determining, by the computer system, movement of the connected fluid phase region from the first timeframe to the second timeframe based on the tracking.
G01P 5/00 - Mesure de la vitesse des fluides, p. ex. d'un courant atmosphériqueMesure de la vitesse de corps, p. ex. navires, aéronefs, par rapport à des fluides
55.
RELIABILTY ENHANCEMENT IN A DISTRIBUTED STORAGE SYSTEM
Machines, systems and methods for enhancing data recovery in a data storage system, the method comprising determining whether one or more data storage mediums in a data storage system are unavailable; determining data that are at a risk of loss, due to said one or more data storage mediums being unavailable; from among the data that is determined to be at the risk of loss, identifying data that is highly vulnerable to loss; and creating one or more temporary replicas of the data that is highly vulnerable to loss.
According to embodiments of the present invention, methods, systems and computer- readable media are presented for scanning a plurality of storage regions within memory for a specified quantity of results, wherein each storage region is associated with an interval including first and second interval values indicating a value range for values within that storage region. The techniques comprise sorting the first interval values into an order, wherein the order of the first interval values determines a scanning order for the plurality of storage regions, determining a result value, wherein the result value is an upper bound, a lower bound, or is outside of the specified quantity of results, and examining the sorted first interval values and scanning corresponding individual storage regions in response to a comparison of the determined result value with the first interval value of that storage region. In some embodiments, scanning exits upon establishing that the specified quantity of results has been achieved and that a first interval value in a list of sorted first interval values is greater than the determined result value.
A system and method for collaborative vehicle crash planning employs a model-based approach for mitigating damage and injuries resulting from a vehicle collision. A real-time crash model is generated to determine an optimal crash sequence within a parallel computing environment.
B60R 21/00 - Dispositions ou équipements sur les véhicules pour protéger les occupants ou les piétons ou pour leur éviter des blessures en cas d'accidents ou d'autres incidents dus à la circulation
A computer implemented method and system for delaying a floating interruption while a processor is in a transactional-execution mode. A floating interruption mechanism can detect a floating interruption request for one or more floating interruption eligible processors. Based on each eligible processor being in TX mode, the method and system can delay, using a predetermined period of time, performing the floating interruption at a selected processor of the one or more of the processors. A first processor of the one or more processors can be selected based on the first processor exiting the transactional execution mode within the predetermined period of time. Based on the predetermined period of time expiring, the method and system can cause an interrupt to one of the plurality of processors, and the interrupt can cause the processor to abort a transaction.
Contact openings are formed into a dielectric material exposing a surface portion of a semiconductor substrate. A first transition metal liner including at least one first transition metal element, a second transition metal liner including at least one second transition metal element that is different from the at least one first transition metal element and a metal contact are sequentially formed within each contact opening. Following a planarization process, the structure is annealed forming metal semiconductor alloy contacts at the bottom of each contact opening. Each metal semiconductor alloy contact that is formed includes the at least one first transition metal element, the at least one second transition metal element and a semiconductor element.
INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE (Taïwan, Province de Chine)
IBM JAPAN, LTD. (Japon)
Inventeur(s)
Chen, Li-Ju
Ho, Chia-Wen
Chang, Hung-Yang
Wang, Yi-Chang Molly
Lo, Jones
Abrégé
Disclosed is a computer-Implemented method for recommending booths-to-visit to a user, comprising the following steps: accessing a map database of an exhibition, wherein the map databases stores location data of a plurality of booths in the exhibition; accessing a history database, wherein the history database stores a plurality of records, and each record stores data indicative of booths visited by a previous visitor in the exhibition; accessing a user record, wherein the user record includes data indicative of the booths which the user has visited in the exhibition; determining similarity level between each record in the history database and the user record, selecting one of the records according to the determined similarity level so as for the selected record to function as a reference record, and determining according to the reference record the booths not yet visited by the user; obtaining the user's current location in the exhibition, and determining a target booth, from the booths not yet visited by the user, by referring to the current location and the map database; and sending to the user a message indicative of the target booth.
Provided are techniques for building an undo log for in-memory blocks of data. Permission on a block of data in memory is set to prevent updates to that block of data using a memory protection function. In response to an update operation attempting to update the block of data in the memory, an interrupt with a location of the block of data is received, the block of data is copied to an undo log entry in an undo log, and the permission on the block of data in the memory is set to allow the update to that block of data to proceed using the memory protection function.
Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.
A technique for operating a data storage system that includes a non-volatile memory array controlled by a controller includes storing, in the non-volatile memory array, first data whose frequency of access is above a first access level in a bandwidth optimized code word. Second data whose frequency of access is below a second access level is stored in the non-volatile memory in a code rate optimized code word.
A device comprising: a housing mountable on a back surface of a handheld electronic device; a radar coupled with the housing, the radar comprising: (a) a receiver unit comprising at least one receiving antenna element; (b) a transmitter unit comprising at least one transmitting antenna element; an integrated circuit (IC) module; and an interface unit configured to operatively couple the radar with the handheld electronic device.
G01S 7/03 - Détails de sous-ensembles HF spécialement adaptés à ceux-ci, p. ex. communs à l'émetteur et au récepteur
G01S 13/34 - Systèmes pour mesurer la distance uniquement utilisant la transmission d'ondes continues, soit modulées en amplitude, en fréquence ou en phase, soit non modulées utilisant la transmission d'ondes continues modulées en fréquence, tout en faisant un hétérodynage du signal reçu, ou d’un signal dérivé, avec un signal généré localement, associé au signal transmis simultanément
H04M 1/00 - Équipement de sous-station, p. ex. pour utilisation par l'abonné
65.
EXTENDING USEFUL LIFE OF A NON-VOLATILE MEMORY BY HEALTH GRADING
In at least one embodiment, a controller of a non-volatile memory array determines, for each of a plurality of regions of physical memory in the memory array, an associated health grade among a plurality of health grades and records the associated health grade. The controller also establishes a mapping between access heat and the plurality of health grades. In response to a write request specifying an address, the controller selects a region of physical memory to service the write request from a pool of available regions of physical memory based on an access heat of the address and the mapping and writes data specified by the write request to the selected region of physical memory.
A computing device includes at least one processor, and at least one module operable by the at least one processor to receive data representing a hierarchy, wherein the hierarchy comprises at least one set of sibling nodes and a respective parent node, generate a condensed hierarchy by determining a grouping for the at least one set of sibling nodes, determine whether the at least one set of sibling nodes can be represented by the respective parent node, based at least in part on the grouping for the at least one set of sibling nodes, and responsive to determining that the at least one set of sibling nodes can be represented by the respective parent node, remove the at least one set of sibling nodes from the condensed hierarchy. The at least one module may further be operable by the at least one processor to output the condensed hierarchy for display.
Embodiments relate to virtual networks. An aspect includes a method for controlling a virtual network including analyzing header content of packet traffic, where the packet traffic corresponds to one or more virtual machines run on a computer. The method includes performing flow routing of the packet traffic through a virtual network based on the analyzing overlay virtual network identifiers or virtual extensible local area network (VXLAN) identifiers in the header content.
A method, system and computer-usable medium are disclosed for identifying unchecked criteria in unstructured and semi-structured data within a form. Text spans representing unchecked criteria within unstructured text in a form are detected and classified to facilitate accurate interpretation of the text. Section identification and annotation operations are then performed to identify and categorize sections within the form. Checklist sections within the form, along with associated checkmarks and boxes, are then identified, followed by the identification of checked item, criteria scope, and previously undetected checklist sections. Once all checklist sections and checked criteria have been identified, remaining text spans within a checklist section are annotated as unchecked criteria.
An aspect includes receiving, at a software-defined networking (SDN) controller, an inquiry from a virtual switch executing on a host machine. The inquiry includes a request to identify a flow of a data packet received at the virtual switch from a source virtual processor. The source virtual processor is either a logical partition (LPAR) or a virtual machine (VM) executing under control of a hypervisor on the host machine. A destination virtual processor associated with the data packet is determined by the SDN controller. In addition, the SDN controller identifies the flow between the source virtual processor and the destination virtual processor. The flow includes a least one virtual port in the virtual switch. The SDN controller instructs the virtual switch to send the data packet from the source virtual processor to the destination virtual processor via the identified flow.
Mechanisms are provided for performing an analysis of content based on a flow of property between entities. The mechanisms analyze a corpus of unstructured documents to identify one or more asset transfer flow relationships between entities. The mechanisms generate an asset transfer flow model defining a flow of an asset between entities based on the one or more asset transfer flow relationships between entities. The mechanisms input the asset transfer flow model into an analysis engine for use in analyzing content. The mechanisms analyze the content using the asset transfer flow model to generate results of the analysis and output the results of the analysis based on the asset transfer flow model.
Embodiments relate to a software-defined networking (SDN) single-source enterprise workload manager. An aspect includes a computer-implemented method for SDN single-source enterprise workload management. A network flow graph of a workload is received at an SDN controller in an enterprise network from a workload compiler of the enterprise network. The network flow graph defines interactions between a plurality of subprograms distributed in the enterprise network based on compile-time information of the workload. The SDN controller analyzes the network flow graph to identify the interactions between the subprograms as prompts. The SDN controller allocates network resources to define a plurality of flows through the enterprise network based on the prompts and characteristics of the enterprise network. Network traffic in the enterprise network is controlled based on the flows.
When a main processor issues a command to co-processor, a timeout value is included in the command. As the co-processor attempts to execute the command, it is determined whether the attempt is taking time beyond what is permitted by the timeout value. If the timeout is exceeded then responsive action is taken, such as the generation of a command timeout type failure message. The receipt of the command with the timeout value, and the consequent determination of a timeout condition for the command, may be determined by: the co-processor that receives the command, or a watchdog timer that is separate from the co-processor. Also, detection of co-processor hang and/or hung co-processor conditions during the time that a co-processor is executing a command for the main processor.
Embodiments include a multilevel network with inter-layer multipath redundancy between a first network layer of leaf switches and a second network layer of spine switches. Each leaf switch is connected to multiple spine switches to provide multiple inter-layer communication paths between the leaf switches and the spine switches. Each spine switch is assigned a common Layer 2 and 3 network address, while each leaf switch is configured with an inter-layer link selection protocol to selectively connect only one active inter-layer link between the leaf switch and the wide area layer while disabling all other available inter-layer links between the leaf switch and the wide area layer. Alternative inter-layer links is thus activated without requiring the leaf switch to be configured with a new address for the alternate inter-layer link or relying on any multipath functionality implemented within the spine switches.
H04L 12/711 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès par chemins actifs ou en veille M :N
H04L 12/44 - Réseaux en étoile ou réseaux arborescents
H04L 12/713 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondances de nœud, p.ex. VRRP
74.
SOFTWARE-DEFINED NETWORKING INTERFACE BETWEEN MULTIPLE PLATFORM MANAGERS
Embodiments relate to a software-defined networking (SDN) interface between multiple platform managers. An aspect is a computer-implemented method for receiving, at an SDN controller of a network, provisioning data from a first network provisioning application associated with a first platform manager of a first computing platform. Provisioning data are received at the SDN controller from a second network provisioning application associated with a second platform manager of a second computing platform. The SDN controller compares the provisioning data from the first network provisioning application to the provisioning data from the second network provisioning application to identify provisioning issues. The SDN controller determines a modified provisioning that resolves the provisioning issues. The SDN controller configures the network to comply with the modified provisioning. The modified provisioning is reported to the first and second network provisioning applications.
When backing up data on tape, the present invention eliminates or reduces degradation in performance at the time of reading out an edited file, while retaining a data history. The present invention provides a method for backing up data on tape in a file system. The method includes: a step for copying a data area in a first data area, except a third data area, and a second data area as a fourth contiguous data area to a tape, in which step the second data area is copied to a position equivalent to a replacement of the third data area; a step for storing, on the tape, index information for specifying the fourth data area; a step for copying the third data area to the tape as a fifth data area set apart from the fourth data area; and a step for storing, on the tape, index information for specifying a data area in the fourth data area, except the second data area, and index information for specifying the fifth data area.
In a data storage system including a non-volatile random access memory (NVRAM) array, a page is a smallest granularity of the NVRAM array that can be accessed by read and write operations, and a memory block containing multiple pages is a smallest granularity of the NVRAM array that can be erased. Data are stored in the NVRAM array in page stripes distributed across multiple memory blocks. In response to detection of an error in a particular page of a particular block of the NVRAM array, only the particular page of the particular block is retired, such that at least two of the multiple memory blocks across which a particular one of the page stripes is distributed include differing numbers of active (non-retired) pages.
An approach is provided for mining threaded online discussions. In the approach, performed by an information handling system, a natural language processing (NLP) analysis is performed on threaded discussions pertaining to a given topic. The analysis is performed across multiple web sites with each of the web sites including one or more threaded discussions. The analysis results in harvested discussions pertaining to the topic. The harvested discussions are correlated and a question is identified from the harvested discussions. A set of candidate answers is also identified from the harvested discussions, with one of the candidate answers being selected as the most likely answer to the identified question.
AGENCY FOR SCIENCE, TECHNOLOGY AND RESEARCH (Singapour)
UNIVERSIDAD DEL PAIS VASCO/EUSKAL HERRIKO UNIBERTSITATEA (Espagne)
IBM JAPAN, LTD. (Japon)
Inventeur(s)
Chan, Julian M.W.
Engler, Amanda C.
Hedrick, James L.
Ke, Xiyu
Ng, Victor W.L.
Sardon, Hariz
Tan, Jeremy P.K.
Yang, Yi Yan
Abrégé
Nanoparticles comprise a drug, a first block polymer and a second block polymer. The first block polymer has a poly(ethylene oxide) (PEO) block and a polycarbonate block bearing a side chain aromatic nitrogen-containing heterocycle (N-heterocycle). The N-heterocycle can be in the form of a base, a hydrosalt of the base, a sulfobetaine adduct of the base, or a combination thereof. The second block polymer has a PEO block and a polycarbonate block bearing a side chain catechol group, which can be present as a catechol, oxidized form of a catechol, and/or a polymerized form of a catechol. The nanoparticles can be dispersed in water and are capable of controlled release of the drug.
A61K 31/704 - Composés ayant des radicaux saccharide liés à des composés non-saccharide par des liaisons glycosidiques liés à un composé carbocyclique, p. ex. phloridzine liés à un système carbocyclique condensé, p. ex. sennosides, thiocolchicosides, escine, daunorubicine, digitoxine
A61K 31/7088 - Composés ayant au moins trois nucléosides ou nucléotides
A61K 38/00 - Préparations médicinales contenant des peptides
A61K 47/34 - Composés macromoléculaires obtenus par des réactions autres que celles faisant intervenir uniquement des liaisons non saturées carbone-carbone, p. ex. polyesters, acides polyaminés, polysiloxanes, polyphosphazines, copolymères de polyalkylène glycol ou de poloxamères
C08G 64/16 - Polycarbonates aliphatique-aromatiques ou araliphatiques
According to one aspect of the present disclosure, a system and technique for workload processing includes a host having a processor unit and a memory. A scheduler is executable by the processor unit to: receive a request to process a workload; access historical processing data to determine execution statistics associated with previous processing requests; determine whether the data of the workload is available for processing; in response to determining that the data is available for processing, determine whether a process for the workload is available; in response to determining that the process is available, determine resource availability on a computing platform for processing the workload; determine whether excess capacity is available on the computing platform based on the resource availability and the execution statistics; and in response to determining that excess capacity exists on the computing platform, initiate processing of the workload on the computing platform.
Extracting and mining of quote data across multiple languages, including: retrieving, from a plurality of quote sources, a plurality of commentary summarizations, wherein each commentary summarization is embodied as a machine-readable data structure and wherein the plurality of commentary summarizations include information in at least two or more languages; for each commentary summarization: identifying, within the commentary summarization, quote data, wherein the quote data represents a quote from a commentator; creating a quote tuple for the quote data, the quote tuple including information associated with quantifiable aspects of the quote data; and storing, in a quote tuple repository, the quote tuple; mining, for quote analysis information, the quote tuple repository; and presenting, to a user, the quote analysis information.
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
81.
ERROR CORRECTION IN TABLES USING A QUESTION AND ANSWER SYSTEM
Mechanisms are provided for performing tabular data correction in a document. The mechanisms receive a natural language document comprising a portion of content and analyze the portion of content within the natural language document to identify an erroneous sub-portion comprising an erroneous or missing item of information. The mechanisms generate a semantic signature for the erroneous sub-portion and generate a query based on the semantic signature. The mechanisms apply the query to a knowledge base to identify a candidate sub-portion of content. The mechanisms correct the erroneous sub-portion using the identified candidate sub-portion of content to generate a corrected natural language document.
A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.
Provided is an interactive test schedule adjustment method using a computer. This method comprises: (a) a step for displaying a table including importance degrees and test periods regarding a plurality of test items, respectively; (b) a step for, on the basis of the values of the importance degrees and test periods inputted in the table, displaying, as a first optimal schedule obtained from an optimal solution calculated by mathematical programming, the usage schedule of each of test facilities used for the plurality of test items; (c) a step for, if an importance degrees in the table is changed, changing the usage schedule of the test item the importance degree of which has been changed in the first optimal schedule, and displaying a second optimal schedule obtained from an optimal solution recalculated by mathematical programming; and a step (d) for, if a user consensus is not formed even on the second optimal schedule, displaying a third optimal schedule based on a neighborhood solution obtained by a search method using the history of the optimal solution.
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]
Embodiments of the present invention relate to space-efficient key allocations in broadcast encryption systems. In one embodiment, a method of and computer program product for broadcast encryption is provided. In this embodiment, a key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. Encrypted content is received. A plurality of encrypted keys is received. Each encrypted key has an associated identifier. A first encrypted key is selected from the plurality of encrypted keys such that the key identifier of the first encrypted is equivalent to the first key identifier. A first cryptographic function is determined corresponding to the first cryptographic function identifier. The first cryptographic function is applied to the first encrypted key using the first cryptographic key to obtain a first intermediate cryptographic key. A content cryptographic key is determined using the first intermediate cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
Provided is a method of depolymerizing polyesters from post-consumer products, such as beverage bottles, to produce a high purity reaction product. For the depolymerization reaction, the polyesters are reacted with an alcohol having 2 to 5 carbons and an amine organocatalyst at a temperature of about 150 degrees C to about 250 degrees C. In one application, the use an organocatalyst with a boiling point significantly lower than the boiling point of the reactant alcohol allows for the ready recycling of the amine organocatalyst. In another application, performing the depolymerization reaction under pressure at a temperature above that of the alcohol allows for accelerated depolymerization rates and the recovery of the organocatalyst with no further heat input. In a further application, glycolytic depolymerization of poly(ethylene terephthalate) (PET) from post-consumer beverage bottles produces a pure reaction product of bis(2-hydroxyethyl)terephthalate (BHET), which may in turn be used to produce high purity beverage bottle grade PET, in a closed loop process with minimal output and waste.
C07C 51/09 - Préparation d'acides carboxyliques, de leurs sels, halogénures ou anhydrides à partir de lactones ou d'esters d'acides carboxyliques
C08G 63/00 - Composés macromoléculaires obtenus par des réactions créant une liaison ester carboxylique dans la chaîne principale de la macromolécule
C08J 11/18 - Récupération ou traitement des résidus des polymères par coupure des chaînes moléculaires des polymères ou rupture des liaisons de réticulation par voie chimique, p. ex. dévulcanisation par traitement avec une substance organique
C08J 11/24 - Récupération ou traitement des résidus des polymères par coupure des chaînes moléculaires des polymères ou rupture des liaisons de réticulation par voie chimique, p. ex. dévulcanisation par traitement avec une substance organique par traitement avec des composés organiques contenant de l'oxygène contenant des groupes hydroxyle
Method, system, and computer program products, implementing and using techniques for processing data representing observations of entities. An anonymized key is generated. The anonymized key represents a spacetime region with which an entity is associated. The spacetime region represents a spatial region and a time interval. The entity is associated with the spacetime region based on spacetime coordinates for the entity.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G09C 1/00 - Appareils ou méthodes au moyen desquels une suite donnée de signes, p. ex. un texte intelligible, est transformée en une suite de signes inintelligibles en transposant les signes ou groupes de signes ou en les remplaçant par d'autres suivant un système préétabli
87.
PACKAGE ASSEMBLY FOR THIN WAFER SHIPPING AND METHOD OF USE
A package assembly for thin wafer shipping using a wafer container and a method of use are disclosed. The package assembly includes a shipping container and a wafer container having a bottom surface and a plurality of straps attached thereto placed within the shipping container. The package assembly further includes upper and lower force distribution plates provided within the shipping container positioned respectively on a top side and bottom side thereof.
H01L 21/673 - Appareils spécialement adaptés pour la manipulation des dispositifs à semi-conducteurs ou des dispositifs électriques à l'état solide pendant leur fabrication ou leur traitementAppareils spécialement adaptés pour la manipulation des plaquettes pendant la fabrication ou le traitement des dispositifs à semi-conducteurs ou des dispositifs électriques à l'état solide ou de leurs composants utilisant des supports spécialement adaptés
B65D 81/02 - Réceptacles, éléments d'emballage ou paquets pour contenus présentant des problèmes particuliers de stockage ou de transport ou adaptés pour servir à d'autres fins que l'emballage après avoir été vidés de leur contenu spécialement adaptés pour protéger leur contenu des dommages mécaniques
B65D 85/30 - Réceptacles, éléments d'emballage ou paquets spécialement adaptés à des objets ou à des matériaux particuliers pour objets particulièrement sensibles aux dommages par chocs ou compression
The purpose of the present invention is to discriminate a group of sensors detecting normal operation and a group of sensors detecting abnormal operation from time series data of a plurality of sensors without using a threshold value. According to a first aspect of the present invention, a detection device, a detection method, and a program are provided, the detection device for detecting changes in the output of the plurality of sensors, comprising a first output acquisition unit that acquires a first association matrix indicative of degrees of association between the plurality of sensors for first outputs of the plurality of sensors, a second output acquisition unit that acquires a second association matrix indicative of degrees of association between the plurality of sensors for second outputs of the plurality of sensors, a change calculation unit that calculates a change matrix indicative of the degrees of change between the first association matrix and the second association matrix, and an identification unit that identifies, as a group of changing sensors indicative of changes between the first outputs and the second outputs, a group of sensors corresponding to the portions with greater degrees of change than that of other portions.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
89.
DATA DECOMPRESSION UTILIZING PRE-EXPANDED DICTIONARIES DURING DECOMPRESSION
According to one embodiment, a computer-implemented method of decompressing compressed data is described. A first decompression dictionary is analyzed, the first decompression dictionary including a plurality of chains each with uncompressed data portions distributed in a non-contiguous manner within the first decompression dictionary based on an addressing scheme, where the uncompressed data portions of each chain form a corresponding uncompressed version of compressed data. A second decompression dictionary is generated by combining the uncompressed data portions of each of the chains in the first decompression dictionary to form uncompressed versions of compressed data and instructions are inserted within the second decompression dictionary to decompress compressed data. The compressed data are decompressed by applying the compressed data to the second decompression dictionary. Embodiments further include a system and computer program product for decompressing compressed data in substantially the same manner described above.
H03M 7/42 - Conversion en, ou à partir de codes de longueur variable, p. ex. code Shannon-Fano, code Huffman, code Morse utilisant une table pour le procédé de codage ou de décodage, p. ex. utilisant une mémoire morte
90.
SWITCH CLUSTERS HAVING LAYER-3 DISTRIBUTED ROUTER FUNCTIONALITY
According to one embodiment, Layer-3 (L3) distributed router functionality is provided to a switch cluster by receiving an address resolution protocol (ARP) request packet from a first host at an entry switch in a switch cluster, a switch controller being in communication with the entry switch, and the ARP request packet including a virtual router IP address of the switch controller as a target, forwarding the ARP request packet to the switch controller after adding a header that adheres to a communication protocol used by the switch controller, receiving an ARP response packet from the switch controller indicating: a source IP address corresponding to a virtual router of the switch controller and a SMAC corresponding to the switch controller, forwarding the ARP response packet to the first host after stripping the communication protocol header, and setting the virtual router as a default gateway for traffic received from the first host.
A method includes simulating, in a lattice velocity set, transport of particles in a volume of fluid, with the transport causing collision among the particles; and generating a distribution function for transport of the particles, wherein the distribution function comprises a thermodynamic step and a particle collision step, and wherein the thermodynamic step is substantially independent of and separate from the particle collision step.
INTERNATIONAL BUSINESS MACHINES CORPORATIION (USA)
IBM JAPAN LTD (Japon)
IBM DEUTSCHLAND MANAGEMENT UND BUSINESS SUPPORT GMBH (Allemagne)
Inventeur(s)
Seifert, Jens
Oberhofer, Martin
Rakopoulos, Kostas
Rees, Steve
Abrégé
The present invention relates to a computer implemented method for a logging process in a data storage system (100) comprising a set of storage tiers (115), each storage tier of the set of storage tiers (115) having different performance characteristics, wherein the set of storage tiers (115) is divided into a plurality of subsets of storage tiers (115A, 115B, 115C, 115D) using the performance characteristics, the method comprising: initiating the logging process for creating a separate log file (121A, 121B, 121C, 121D) for each of the plurality of subsets of storage tiers (115A, 115B, 115C, 115D) for maintaining a history of data changes in the subset of storage tiers, thereby creating a plurality of log files (121); in response to a change in data stored in at least one storage tier of a subset of storage tiers of the plurality of subsets of storage tiers (115), generating one or more log records comprising information about the change, and writing the one or more log records into the respective log files (121A, 121B, 21C, 121D).
A method comprising: simulating, in a lattice velocity set, movement of particles in a volume of fluid, with the movement causing collision among the particles; based on the simulated movement, determining relative particle velocity of a particle at a particular location within the volume, with the relative particle velocity being a difference between (i) an absolute velocity of the particle at the particular location within the volume and measured under zero flow of the volume, and (ii) a mean velocity of one or more of the particles at the particular location within the volume; and determining, based on the relative particle velocity, a non-equilibrium post-collide distribution function of a specified order that is representative of the collision.
Reflecting optical devices (408) are optimally positioned by an all optical switch in an optically connected system by transmitting optical power readings taken from an optimal monitoring module (406) that are transmitted to the all optical switch for optimal positioning of a reflecting optical device in order to produce maximum optical power.
G02B 26/08 - Dispositifs ou dispositions optiques pour la commande de la lumière utilisant des éléments optiques mobiles ou déformables pour commander la direction de la lumière
H04Q 3/52 - Circuits pour sélection indirecte commandée par circuits communs, p. ex. contrôleur d'enregistreur, marqueur utilisant des dispositifs statiques dans les étages de commutation, p. ex. des dispositifs de commutation électronique
In the context of a client sub-system that requires the use of directory services on behalf of a tenant (such as an overlay tenant), learning an identity of a server node, that can provide such directory services by: (i) sending, by the client sub-system to a first server node, a first directory service request for directory service for a first tenant; (ii) receiving, by the client sub-system, a first acknowledgement from a second server node; and (iii) learning, by the client sub-system, that the second server node can provide directory service for the first tenant based upon the first acknowledgement.
The present invention relates to a method for implementing a dynamic array data structure (225, 325) in a cache line (211, 311) in a memory system (128) that includes a memory storage (208) and a controller (206). The method comprises: configuring in the memory (206) the cache line (211, 311) as a cache line comprising a metadata field (213, 313) and an elements field (215, 315), wherein the metadata field (213, 313) comprises metadata of the dynamic array data structure (225, 325) and wherein the elements field (215,315) comprises a value of each element of the dynamic array data structure; receiving, by the controller (206), a request (210) for an operation on the dynamic array data structure (225, 325), wherein the request is indicative of a location of the cache line (211, 311) in the memory storage (208) and information specifying the request (210); identifying, by the controller (206), for the operation one or more actions on the dynamic array data structure (225, 325) using the information, wherein the one or more actions are encoded in the controller (206); and in response to receiving the request, performing the request by executing the one or more encoded actions.
A mechanism is provided in a data processing system for logical partition migration. Responsive to a virtual machine monitor initiating a logical partition migration operation to move a logical partition from a source system to a destination system, the mechanism reallocates a portion of processing resources from the logical partition to the virtual machine monitor. The virtual machine monitor uses the portion of processing resources to effect the logical partition migration operation. Responsive to completion of the logical partition migration operation, the mechanism returns the portion of processing resources to the logical partition.
A network security system for generating an alert in response to a security breach being detected in a proxy server in a data processing network, the system comprising: a distributor component intercepts a request for a resource from a client device; creates a duplicate of the intercepted request and forwards the intercepted request to a first type of proxy server and forwards the duplicate of the intercepted request to a second type of proxy server, where in the first type of proxy server and the second type of proxy server are non-identical proxy server types; a comparator component receives the output from the first type of proxy server and the second type of proxy server; compares the output of the first type of proxy server to the output of the second type of proxy server; determines whether the output of the first type of proxy server and the output of the second type of proxy server differ, in response to determining a difference generating an alert.
The present invention relates to a method for implementing a bit array (318) in a cache line (211) of a memory system (128) that includes a memory storage (208) and a controller (206), the method comprising configuring in the cache line (211) the bit array (318), the bit array comprising array of bits, wherein the configuring further comprises defining a value of each bit in the bit array, receiving, by the controller (206), a request (210) for an operation on the bit array wherein the request is indicative of a location of the cache line (211) in the memory storage (208) and information specifying the request; identifying,by the controller (206),for the operation one or more actions on the bit array (318) using the information, wherein the one or more actions are encoded in the controller (206); and in response to receiving the request, performing the request by executing the one or more encoded actions.
A computer system comprises a processor unit arranged to run a hypervisor running one or more virtual machines; a cache connected to the processor unit and comprising a plurality of cache rows, each cache row comprising a memory address, a cache line and an image modification flag; and a memory connected to the cache and arranged to store an image of at least one virtual machine. The processor unit is arranged to define a log in the memory and the cache further comprises a cache controller arranged to set the image modification flag for a cache line modified by a virtual machine being backed up, but not for a cache line modified by the hypervisor operating in privilege mode; periodically check the image modification flags; and write only the memory address of the flagged cache rows in the defined log.
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
G06F 9/46 - Dispositions pour la multiprogrammation