24th week of 2011 patent applcation highlights part 72 |
Patent application number | Title | Published |
20110145624 | SYSTEM AND METHOD FOR ASYNCHRONOUSLY AND INDEPENDENTLY CONTROLLING CORE CLOCKS IN A MULTICORE CENTRAL PROCESSING UNIT - A method of controlling core clocks in a multicore central processing unit is disclosed and may include executing a zeroth dynamic clock and voltage scaling (DCVS) algorithm on a zeroth core and executing a first DCVS algorithm on a first core. The zeroth DCVS algorithm may operable to independently control a zeroth clock frequency associated with the zeroth core and the first DCVS algorithm may be operable to independently control a first clock frequency associated with the first core. | 2011-06-16 |
20110145625 | MULTI-CORE CLOCKING SYSTEM WITH INTERLOCKED 'ANTI-FREEZE' MECHANISM - A clocking system, comprises a plurality of clocked data processing devices and a clock control circuit controlling a generation of a plurality of clock signals and an application of the clock signals to the plurality of data processing devices, allowing to clock at least one of the data processing devices while freezing all but the at least one of the data processing devices. A method for clocking a plurality of clocked data processing devices comprises controlling a generation of a plurality of clock signals and controlling an application of the clock signals to the plurality of data processing devices, allowing to clock at least one of the data processing devices while freezing all but the at least one of the data processing devices. | 2011-06-16 |
20110145626 | VIRTUAL PROCESSOR METHODS AND APPARATUS WITH UNIFIED EVENT NOTIFICATION AND CONSUMER-PRODUCED MEMORY OPERATIONS - The invention provides, in one aspect, a virtual processor that includes one or more virtual processing units. These virtual processing units execute on one or more processors, and each virtual processing unit executes one or more processes or threads (collectively, “threads”). While the threads may be constrained to executing throughout their respective lifetimes on the same virtual processing units, they need not be. An event delivery mechanism associates events with respective threads and notifies those threads when the events occur, regardless of which virtual processing unit and/or processor the threads happen to be executing on at the time. The invention provides, in other aspects, virtual and/or digital data processors with improved dataflow-based synchronization. A process or thread (collectively, again, “thread”) executing withing such processor can execute a memory instruction (e.g., and “Empty” or other memory-consumer instruction) that permits the thread to wait on the availability of data generated, e.g., by another thread and to transparently wake up when that other thread makes the data available (e.g, by execution of a “Fill” or other memory-producer instruction). | 2011-06-16 |
20110145627 | IMPROVING DATA AVAILABILITY DURING FAILURE DETECTION AND RECOVERY PROCESSING IN A SHARED RESOURCE SYSTEM - A system and method for managing shared resources is disclosed. The system includes a primary coherency processing unit which processes lock requests from a plurality of data processing hosts, the primary coherency processing unit also storing a first current lock state information for the plurality of data processing hosts, the first current lock state information including a plurality of locks held by the plurality of data processing hosts. The system further includes a standby coherency processing unit storing fewer locks than the primary coherency processing unit, the locks stored by the standby coherency processing unit being a subset of locks included in the first current lock state information, the standby coherency unit configured to perform a plurality of activities of the primary coherency processing unit using the subset of locks in response to a failure of the primary coherency processing unit. | 2011-06-16 |
20110145628 | Computer-Implemented Methods and Systems for Testing Online Systems and Content - Computer-implemented methods and systems are provided for scanning web sites and/or parsing web content, including for testing online opt-out systems and/or cookies used by online systems. In accordance with one implementation, a computer-implemented method is provided for testing an opt-out system associated with at least one advertising system that uses cookies. The method includes transmitting a first request to an opt-out system, wherein the first request corresponds to a first test for testing at least one of the opt-out system and an advertising system; receiving a first stream sent in response to the first request; determining a first outcome of the first test based on the first stream; and generating a report based on the first outcome. | 2011-06-16 |
20110145629 | FLEXIBLE BUS ARCHITECTURE FOR MONITORING AND CONTROL OF BATTERY PACK - The present invention provides a control system which is used for a stacked battery of a plurality of battery packs. Each battery pack has a plurality of battery cells coupled in series. The control system is capable of reconfiguring communication among the battery packs in the stacked battery, and comprises a plurality of processors, a plurality of controllers, and a monitoring unit. The processors are coupled to the battery packs. Two adjacent processors among the processors are able to communicate with each other though a first bus. The controllers are coupled to the battery packs. Two adjacent controllers among the controllers are able to communicate with each other through a second bus. The processors are capable of communicating with the controllers through a third bus. The monitoring unit is used for monitoring communications among the plurality of processors and communications among the plurality of controllers. The monitoring unit is capable of detecting communication problems on the first bus and/or the second bus. The monitoring unit further is capable of reconfiguring communication paths among the plurality of processors and communication path among the plurality of controllers. | 2011-06-16 |
20110145630 | REDUNDANT, FAULT-TOLERANT MANAGEMENT FABRIC FOR MULTIPARTITION SERVERS - Redundant, fault-tolerant management fabric for multipartition servers are disclosed. In an exemplary embodiment, a method comprises connecting a plurality of rack system components to a first network segment, the connection including at least two physical links sharing a single network address. The method also comprises monitoring communications paths in the first network segment. The method also comprises switching communications from the first network segment to a failover network segment if there is a failure in any of the communications paths in the first network segment. | 2011-06-16 |
20110145631 | ENHANCED CLUSTER MANAGEMENT - An embodiment of the present invention is directed to a method and system for making intelligent failover decisions within a server cluster. The method includes receiving temperature information and location information using RFID technology and detecting an error condition. The method further includes responsive to the error condition, selecting a failover target based on said temperature information and location information and transferring operations from a portion of a storage cluster to the failover target based on the selecting. | 2011-06-16 |
20110145632 | TRANSPARENT RECOVERY FROM HARDWARE MEMORY ERRORS - A method is provided for recovering from an uncorrected memory error located at a memory address as identified by a memory device. A stored hash value for a memory page corresponding to the identified memory address is used to determine the correct data. Because the memory device specifies the location of the corrupted data, and the size of the window where the corruption occurred, the stored hash can be used to verify memory page reconstruction. With the known good part of the data in hand, the hashes of the pages using possible values in place of the corrupted data are calculated. It is expected that there will be a match between the previously stored hash and one of the computed hashes. As long as there is one and only one match, then that value, used in the place of the corrupted data, is the correct value. The corrupt data, once replaced, allows operation of the memory device to continue without needing to interrupt or otherwise affect a system's operation. | 2011-06-16 |
20110145633 | Blocking Write Acces to Memory Modules of a Solid State Drive - Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure. | 2011-06-16 |
20110145634 | APPARATUS, A RECOVERY METHOD AND A PROGRAM THEREOF - An apparatus and method for automatically recovering a hardware when the hardware is not accessible from the processing unit. The hardware is recovered via a path different from a path which the processing unit uses when the processing unit fails to access to the hardware via the path initially used. | 2011-06-16 |
20110145635 | Failure Detection and Fencing in a Computing System - A method, computer program product, and system for detecting and fencing off a failed entity instance so that failover time in the computing system is reduced. Upon detection of a failed entity, for example a failed process, a signal handler invokes an operating system interface to fence off the failed instance from modifying its persistent state, so that the entity may be re-instantiated prior to termination of the failed instance. This approach reduces failover time and eliminates split-brain problems without compromising access to the failed instance to obtain diagnostic information, core dumps, and the like. | 2011-06-16 |
20110145636 | SYSTEMS AND METHODS FOR IMPORTING DATA FROM DATA SOURCES OVER A NETWORK WHILE CORRECTING AND TRANSFORMING THE DATA - Systems and methods for importing data from data sources over a network while correcting and transforming the data are described. A data migration server receives data from various data sources. The data migration server repairs and transforms the received data before transmitting the data to a new data server. In some embodiments, the data migration server repairs data before formatting the data, and in other embodiments, the data migration server formats data before repairing the data. The data migration server also verifies the accuracy of the data, either by comparing the data against data requested and received from third-party servers or in reference to other data from the data sources. | 2011-06-16 |
20110145637 | Performing Mode Switching In An Unbounded Transactional Memory (UTM) System - In one embodiment, the present invention includes a method for selecting a first transaction execution mode to begin a first transaction in a unbounded transactional memory (UTM) system having a plurality of transaction execution modes. These transaction execution modes include hardware modes to execute within a cache memory of a processor, a hardware assisted mode to execute using transactional hardware of the processor and a software buffer, and a software transactional memory (STM) mode to execute without the transactional hardware. The first transaction execution mode can be selected to be a highest performant of the hardware modes if no pending transaction is executing in the STM mode, otherwise a lower performant mode can be selected. Other embodiments are described and claimed. | 2011-06-16 |
20110145638 | DISTRIBUTED STORAGE AND COMMUNICATION - Storing, retrieving, transmitting and receiving data ( | 2011-06-16 |
20110145639 | Method and Apparatus For Controlling Traffic Entry In A Managed Packet Network - A method for control of real-time traffic entry of a managed packet network includes the step of receiving, from a border element processor, a first message indicative of a new active registration request associated with a client. The border element processor is one of a plurality of border element processors at an edge of a managed packet network controlling packets (e.g., relating to real-time multimedia traffic) entering the managed packet network. The method also includes the step of load balancing, by a load balancing engine, the new active registration request across the plurality of border element processors and assigning the client to a designated border element processor. A second message is generated in response to the new activation registration request. The second message includes a parameter identifying the designated border element processor assigned to the client. | 2011-06-16 |
20110145640 | System for Automated Computer Support - Systems and methods for providing automated computer support are described herein. One described method comprises receiving a plurality of snapshots from a plurality of computers, storing the plurality of snapshots in a data store, and creating an adaptive reference model based at least in part on the plurality of snapshots. The described method further comprises comparing at least one of the plurality of snapshots to the adaptive reference model, and identifying at least one anomaly based on the comparison. | 2011-06-16 |
20110145641 | Method and system for VoiceXML quality assurance. - A software quality assurance tool (“IVRT”) for VoiceXML applications is described. IVRT makes speech and telephony irrelevant to the testing of VoiceXML logic. IVRT follows a machine-readable “Test Plan” to execute the logic of an application. The Plan provides the results of telephony interactions. Testing is done without live callers, and runs at computer speed. A Plan contains any number of calls, to guide the application execution through all logic paths. The tool executes the application in a live environment with respect to all non-telephony functions, particularly web interactions, to test the application's web logic. IVRT executes multiple threads, acting as simultaneous callers, to provide controlled load web logic testing. The tool summarizes Plan “coverage”. For regression testing, IVRT tests an updated application with its original Test Plan and compares the log to previous logged output. Differences indicate potential regression failures. | 2011-06-16 |
20110145642 | METHOD AND SYSTEM FOR TESTING AN APPLICATION - The present invention provides a method, test-bed and computer program product for testing an application installed on a wireless communication device. The wireless communication device communicates one or more messages wirelessly to a server through a test-bed. The test-bed is connected with the server and provides one or more testing parameters for the one or more messages. A tester, testing the application, assigns a probability to the one or more messages. Further, the tester assigns a probability to the one or more testing parameters. Thereafter, the messages are re-communicated between the server and wireless communication device through the test-bed. Subsequently, the one or more messages are identified by the test-bed and one or more wireless network conditions are emulated based on the probabilities assigned to the one or more messages and the one or more testing parameters. | 2011-06-16 |
20110145643 | REPRODUCIBLE TEST FRAMEWORK FOR RANDOMIZED STRESS TEST - A test framework architecture that separates the generation of random test actions from test execution and provides a way to record the state of the system under test at user controlled intervals. This saved state is used to bring the test system to the last known state before failure and then execute the much smaller set of actions to the point of failure, thus requiring shorter run time. Given the same time constraints, this enables the execution of this smaller set more frequently, providing better bug fix verification and shorter reproduction time. | 2011-06-16 |
20110145644 | PROTOCOL SEQUENCE GENERATOR - A system for generating test signals to test characteristics of input-output (IO) cells includes a memory and a processor coupled together through an integrated circuit (IC) chip. The IC chip includes a controller configured to exchange signals between the memory and the processor through IO cells of the IC chip. The IC chip further includes a protocol sequence generator for generating test signals for testing characteristics of the IO cells. | 2011-06-16 |
20110145645 | TEST SYSTEM AND METHOD FOR TESTING ELECTRONIC DEVICES USING A PIPELINED TESTING ARCHITECTURE - A test system for performing tests on devices under test (DUTs) includes a storage device storing test data for performing the tests on the DUTs, a shared processor for generating the test data, storing the test data in the storage device and generating a test control signal including one or more test instructions for executing the tests, and, for each DUT, a dedicated processor configured to receive a test control signal from the shared processor, and in response to the test control signal, transfer the test data for one of the test instructions to the DUT to execute that test instruction and verify the completion of that test instruction. | 2011-06-16 |
20110145646 | Use of statistical representations of traffic flow in a data processing system - An apparatus and method are provided for performing verification tests for a design of a data processing system. The apparatus comprises a system under verification representing at least part of the design of the data processing system, and a transactor for connecting to an interface of the system under verification, and for generating signals for input to the system under verification via the interface during performance of the verification tests. Profile storage stores a profile providing a statistical representation of desired traffic flow at the interface, the statistical representation providing statistical information for a plurality of traffic attributes and also identifying at least one dependency between such traffic attributes. The transactor then references the profile in order to determine the signals to be generated, such that the signals generated take account of the specified dependencies identified in the profile. Such a mechanism enables the transactor to more realistically replicate the traffic flow that will be observed in the real system. Another aspect to the present invention provides a mechanism for generating such profiles. | 2011-06-16 |
20110145647 | TROUBLE ANALYSIS APPARATUS - A trouble analysis apparatus is provided which includes: a system topology storing portion; an error detection information receiving portion which collects error detection information; and a trouble source determination portion which, based on both the error detection information collected by the error detection information receiving portion and system topology information stored in the system topology information storing portion, determines a trouble source functional element that is presumed as a functional element which is a source of a system trouble. Links included in the system topology information have information indicating spreading directions of error operations between the functional elements when trouble occurs. When the trouble source detection portion receives the error detection information with regard to multiple error functional elements, the trouble source determination portion sequentially selects one of the multiple error functional elements. The trouble source detection portion determines whether or not directions from the selected error functional element to other error functional elements conform to the spreading directions included in the system topology information. The trouble source determination portion determines the selected error functional element as the trouble source functional element when the spreading directions are conformable. | 2011-06-16 |
20110145648 | Method and Apparatus for Power Diagnostics - A diagnostic tool ( | 2011-06-16 |
20110145649 | Method and a System for Dynamic Probe Authentication for Test and Monitoring of Software - The present invention is related to a method, a system and a computer readable device for authenticated configuration used for configuration of software probes in software modules to be tested in an electrical mobile device. The invention will create and make use of a configuration file by inserting an authentication signature, Probe Identifications (PID) and Probe Locations (PL). | 2011-06-16 |
20110145650 | Analyzing computer programs to identify errors - A method of analyzing a computer program under test (CPUT) using a system comprising a processor and a memory can include performing, by the processor, static analysis upon the CPUT and runtime analysis upon at least a portion of the CPUT. A static analysis result and a runtime analysis result can be stored within the memory. Portions of the CPUT analyzed by static analysis and not by runtime analysis can be determined as candidate portions of the CPUT. The candidate portions of the CPUT can be output. | 2011-06-16 |
20110145651 | SOFTWARE PERFORMANCE COUNTERS - A system for providing software performance counters includes an operating system that receives a first request of a first application to monitor performance of a second application, the first request identifying a type of event to monitor during the execution of the second application. The operating system determines that the event is a software event, monitors the performance of the second application with respect to the type of the software event, and updates a counter associated with the type of the software event based on the monitoring. Further, the operating system receives a second request of the first application for performance data associated with the type of the software event counter, and provides the value of the counter to the first application. | 2011-06-16 |
20110145652 | Computer-Implemented Systems And Methods For An Automated Application Interface - In accordance with the teachings described herein, systems and methods are provided for an automated application interface. One or more wizards may be used to receive user input in order to perform one or more software interface operations to manipulate a first set of data between data analysis software and database software. Information associated with the user input may be captured and used to generate one or more template data stores. A user interface may be used to modify at least one template data store to identify a subsequent set of data. The template data stores may be automatically executed in an identified sequence to perform software interface and data analysis operations for the subsequent set of data. | 2011-06-16 |
20110145653 | METHOD AND SYSTEM FOR TESTING COMPLEX MACHINE CONTROL SOFTWARE - A method and system for testing complex machine control software A method of formally testing a complex machine control software program in order to determine defects within the software program is described. The software program to be tested (SUT) has a defined test boundary, encompassing the complete set of visible behaviour of the SUT, and at least one interface between the SUT and an external component, the at least one interface being defined in a formal, mathematically verified interface specification. The method comprises: obtaining a usage model for specifying the externally visible behaviour of the SUT as a plurality of usage scenarios, on the basis of the verified interface specification; verifying the usage model, using a usage model verifier, to generate a verified usage model of the total set of observable, expected behaviour of a compliant SUT with respect to its interfaces; extracting, using a sequence extractor, a plurality of test sequences from the verified usage model; executing, using a test execution means, a plurality of test cases corresponding to the plurality of test sequences; monitoring the externally visible behaviour of the SUT as the plurality of test sequences are executed; and comparing the monitored externally visible behaviour with an expected behaviour of the SUT. | 2011-06-16 |
20110145654 | METHOD AND APPARATUS FOR THE DETERMINATION OF A REPETITIVE BIT VALUE PATTERN - A repetitive bit value pattern associated to a predetermined bit position of a sequence of data words, the data words having two or more bits in a bit order, a bit position describing a position within the bit order being indicative of a value represented by the bit at the bit position, can be determined from program loop information, the program loop information having a program expression for determining an updated data word of the sequence of data words. Using the predetermined bit position, a sequence length value associated to the predetermined bit position is determined. The program expression is evaluated for a number of loop iterations indicated by the sequence length value, to obtain updated bit values associated to the predetermined bit position. The repetitive bit value pattern is determined using the updated bit values of the number of loop iterations. | 2011-06-16 |
20110145655 | INPUT/OUTPUT HUB TO INPUT/OUTPUT DEVICE COMMUNICATION - Example apparatus and methods virtualize a circuit disposed between an input/output (I/O) hub and an I/O device. The I/O hub is configured to communicate PCIe slot control and status signals with an I/O device via an interface. The example apparatus and methods selectively intercept and transform signals passing between the I/O hub and the I/O device. The example apparatus and methods may also provide intercepted signals to a sideband monitor. | 2011-06-16 |
20110145656 | Analyzing A Distributed Computer System - Analyzing a distributed computer system, wherein said distributed computer system comprises at least one hardware unit to process data, an interconnection network and at least one processing unit to initialize said at least one hardware unit by using said interconnection network. According to the inventive method different trace files generated by components of said distributed computer system are post-analyzed and trace lines inside said different trace files belonging to the same action executed from at least one component inside said distributed computer system are identified by using unique key expressions, wherein an output file with context and/or time distribution information for different actions is generated by extracting trace lines representing cross process or cross controller calls and/or function calls for each related action based on an input file. | 2011-06-16 |
20110145657 | INTEGRATED FORENSICS PLATFORM FOR ANALYZING IT RESOURCES CONSUMED TO DERIVE OPERATIONAL AND ARCHITECTURAL RECOMMENDATIONS - A method for facilitating forensic analysis of operational data for an IT infrastructure includes deriving performance data from a plurality of physical systems, network elements and storage devices in an IT infrastructure via a toolset comprising a plurality of IT monitoring and metrics tools, importing the performance data into an integrated forensics platform, aggregating the imported data, and analyzing the aggregated data to determine resources consumed. Each tool is communicatively interfaced with one or more of the physical systems, network elements and storage devices. | 2011-06-16 |
20110145658 | ELECTRONIC APPARATUS AND METHOD OF CONTROLLING ELECTRONIC APPARATUS - An electronic apparatus is provided. A main control section outputs data including fiscal information input from an interface. A recording control section is connected to the main control section. The recording control section controls a recording section on the basis of the data output from the main control section to issue a receipt. A memory control section is connected to the main control section and a memory. The memory control section reads and writes the fiscal information from and to the memory under the control of the main control section. When the data is input to the main control section from the interface, the main control section controls the memory control section to write the fiscal data to the memory. A log creation section creates a log that the main control section controls the memory control section to read the fiscal information from the memory. | 2011-06-16 |
20110145659 | LOG COLLECTING APPARATUS, PROGRAM, METHOD, AND SYSTEM - A log collecting apparatus includes: a response data forwarding unit to respond to a trace log request; a determining unit determines whether the ratio of error logs versus unsent trace logs is equal to or greater than a predetermined threshold value; a differential trace log creator configured to create differential trace logs, wherein the duplicate error logs have been deleted from the unsent trace logs, when it is determined that the error log ratio is equal to or greater than the predetermined threshold value; and a response data configuration unit configured to set response data with the differential trace logs, and to set the response data with the unsent trace logs when the error log ratio is not equal to or greater than the predetermined threshold value. | 2011-06-16 |
20110145660 | DETECTION AND REDUCTION OF EXCESSIVE SNMP TRAFFIC - Various embodiments herein include at least one of systems, methods, and software to detect and reduce messages from network entity management clients that are not utilized by a network management system. Once identified, the network management system may send a command to the network entity management clients to no longer send particular message types to the network management system. The network management system may also, or alternatively configured to take no action when such messages are subsequently received. | 2011-06-16 |
20110145661 | Selectively displaying source code defect information within a source code editor - Selectively presenting source code defect information within a source code editor. In the source code editor, a defect tracking identifier can be presented. The defect tracking identifier can be associated with a defect record contained in a defect tracking system. When a user selects the defect tracking identifier, defect information associated with the defect can be automatically retrieved from the defect tracking system. The defect information can be presented in the source code editor. | 2011-06-16 |
20110145662 | COORDINATION OF ERROR REPORTING AMONG MULTIPLE MANAGED RUNTIMES IN THE SAME PROCESS - Systems and methods are described for coordinating error reporting among a plurality of managed runtimes that are concurrently executing in the same process. In accordance with various embodiments, an error reporting manager that executes concurrently in the same process as the managed runtimes coordinates error reporting among the managed runtimes in a manner that does not require the managed runtimes to be aware of each other or to communicate directly with each other. | 2011-06-16 |
20110145663 | Read level control apparatuses and methods - Various read level control apparatuses and methods are provided. In various embodiments, the read level control apparatuses may include an error control code (ECC) decoding unit for ECC decoding data read from a storage unit, and a monitoring unit for monitoring a bit error rate (BER) based on the ECC decoded data and the read data. The apparatus may additionally include an error determination unit for determining an error rate of the read data based on the monitored BER, and a level control unit for controlling a read level of the storage unit based on the error rate. | 2011-06-16 |
20110145664 | TEST MODULE AND TEST METHOD - Provided is a test module that tests a device under test, comprising a pattern generating section that generates a test pattern supplied to the device under test and an expected value pattern corresponding to the test pattern, based on a pattern program; an output pattern acquiring section that acquires an output pattern output by the device under test in response to the test pattern; a comparing section that compares the output pattern output and the expected value pattern; a fail counter that counts the number of times the comparing section indicates a mismatch between the output pattern and the expected value pattern; and a control section that controls operation of the fail counter according to control instructions in the pattern program. | 2011-06-16 |
20110145665 | ACCESSING SEQUENTIAL DATA IN A MICROCONTROLLER - System and methods transfer data over a microcontroller system test interface. The system can read data from and write data to microcontroller system memory using the described method. The method provides for the efficient transfer of data, minimizing redundancies and overhead present in conventional microcontroller test system protocols. | 2011-06-16 |
20110145666 | ADAPTING SCAN ARCHITECTURES FOR LOW POWER OPERATION - Scan architectures are commonly used to test digital circuitry in integrated circuits. The present disclosure describes a method of adapting conventional scan architectures into a low power scan architecture. The low power scan architecture maintains the test time of conventional scan architectures, while requiring significantly less operational power than conventional scan architectures. The low power scan architecture is advantageous to IC/die manufacturers since it allows a larger number of circuits (such as DSP or CPU core circuits) embedded in an IC/die to be tested in parallel without consuming too much power within the IC/die. Since the low power scan architecture reduces test power consumption, it is possible to simultaneously test more die on a wafer than previously possible using conventional scan architectures. This allows wafer test times to be reduced which reduces the manufacturing cost of each die on the wafer. | 2011-06-16 |
20110145667 | SERIAL I/O USING JTAG TCK AND TMS SIGNALS - The present disclosure describes a novel method and apparatus of using the JTAG TAP's TMS and TCK terminals as a general purpose serial Input/Output (I/O) bus. According to the present disclosure, the TAP's TMS terminal is used as a clock signal and the TCK terminal is used as a bidirectional data signal to allow serial communication to occur between; (1) an IC and an external controller, (2) between a first and second IC, or (3) between a first and second core circuit within an IC. | 2011-06-16 |
20110145668 | FLASH MEMORY DEVICE, FLASH MEMORY SYSTEM, AND METHOD OF PROGRAMMING FLASH MEMORY DEVICE - A flash memory device comprises a plurality of memory cells each configured to store k-bit data, where k is a natural number greater than one. The device is programmed by a method comprising reading (i−1)-th order data from a selected memory cell connected to a selected wordline before programming i-th order data in one or more adjacent memory cells connected to an adjacent wordline, wherein i is a natural number between two and k, storing as read data the (i−1)-th order data read from the selected memory cell, and programming i-th order data in the selected memory cell based on the stored read data. | 2011-06-16 |
20110145669 | DATA DERATE MATCHER FOR SUPPORTING HARQ AND METHOD THEREOF - A data derate matcher for supporting hybrid automatic repeat request (HARQ), includes a control parameter generation unit for generating control parameters to separate bits of an input bit stream e | 2011-06-16 |
20110145670 | Method for High-Efficient Implementation of De-Rate Matching Including HARQ Combining for LTE - Embodiments of the invention provide a method of de-rate matching without NULL bits skipping. Date is received without NULLs and inputted into a LLR combining block. The history data without NULLs is buffered. Log-likelihood ratio (LLR) combining is called before de-rate matching. The output of LLR combining is de-interleaved. The reading pointer is offset to forge NULLs. Finally, de-interleaving output without NULLs is sent to a turbo decoder. | 2011-06-16 |
20110145671 | METHOD AND APPARATUS FOR ITERATIVE DETERMINATION OF MIMO ITERATIVE RECEIVER - A multiple input multiple output (MIMO) iterative receiver detects a soft log likelihood ratio value from a signal outputted from a transmitter and decodes the detected soft log likelihood ratio value in order to extract a hard value and a soft value from the detected soft log likelihood ratio value. After whether or not a CRC of the hard value is acknowledged is determined, a CRC of a data burst is determined or iteration of signal demodulation of the MIMO iterative receiver is determined by feeding back the soft value or a CRC of data is performed assembling signals of the burst unit in accordance with the determination result. | 2011-06-16 |
20110145672 | HARQ Process Continuation after CQI-Only Report - Techniques for controlling synchronous HARQ retransmissions are disclosed, in which non-adaptive retransmissions scheduled for a first transmission time interval are automatically deferred to a later transmission time interval in the event that a control message prohibiting the retransmission during the first transmission interval is received. In an exemplary method, a NACK message is received ( | 2011-06-16 |
20110145673 | AUTHENTICATION OF CONTENT DOWNLOAD - According to the invention, a method for authenticating download of a number of digital content files ordered from a web site is disclosed. In one step, a selection of the digital content files is received with the web site. Download manager software, media information, the digital content files, and first codes for each of the digital content files are sent to the client computer. The media information indicates a location of each of the number of digital content files. A first code is calculated for each of the digital content files. If the client computer determines that the first code doesn't match a second code for a particular digital content file, it is resent. | 2011-06-16 |
20110145674 | High-efficiency dynamic transmission that has a high speed and reliability - A system and method for error correction coding is configured to dynamically implement one of a number of error correction coding methods during a transmission of data. The error correction coding method is selected based on a measured bit error rate during the transmission of data. The implementation of the error correction coding method is performed without interrupting the data transmission. | 2011-06-16 |
20110145675 | CALCULATION TECHNIQUE FOR SUM-PRODUCT DECODING METHOD (BELIEF PROPAGATION METHOD) BASED ON SCALING OF INPUT LOG-LIKELIHOOD RATIO BY NOISE VARIANCE - One or more embodiments provide a decoding technique (and its approximate decoding technique) enabling a stable operation even if a noise variance is low at the implementation with a fixed-point arithmetic operation having a finite dynamic range. A technique is provided for causing a computer to perform calculation using a sum-product decoding method (belief propagation method) with respect to LDPC or turbo codes. For calculating an update equation of a log extrinsic value ratio from an input, a (separated) correction term is prepared obtained by variable transformation (scale transformation) of the update equation so that the update equation is represented by a sum (combination) of a plurality of terms by transformation of the equation and a communication channel noise variance is a term separated from other terms constituting a sum of a plurality of terms as a term to be a factor (scale factor) by which a log is multiplied. With an estimated communication channel noise variance as an input, the (separated) correction term is approximated by a simple function so as to cause the computer to make calculation (iteration) on the basis of a fixed point on bit strings of finite length (m,f: m is the total number of bits and f is the number of bits allocated to the fractional part). | 2011-06-16 |
20110145676 | DATA ERROR CORRECTION DEVICE AND METHODS THEREOF - A method and device for error detection includes performing error detection for each data word received in a burst access to a memory. When no error is detected, the data words are written to a cache and indicated as valid data. In response to detecting an error in a data word, the error is corrected and the corrected data written to the cache without indicating the data as valid. In addition, the location of the detected error, indicating the data symbol associated with the error, is recorded in an error vector. The error vectors associated with each data word in the burst access are compared to determine whether a detected error was properly corrected. | 2011-06-16 |
20110145677 | METHOD AND SYSTEM FOR FAST TWO BIT ERROR CORRECTION - An error locator unit for correcting two bit error. The error locator unit includes a plurality of operational units, a normalized basis transform unit, and a conversion unit. The plurality of operations units calculates coefficients of the polynomial based on the generated syndromes in a first basis of a Galois Field. Operating on the coefficients produces a root definition value vector in the first basis. The normalized basis transform unit transforms the root definition value vector to a normal basis to produce a plurality of roots. The conversion unit converts the plurality of roots to the first basis. A scaling factor calculated based on the coefficients is applied to the output of the conversion unit to produce a plurality of scaled roots for said polynomial in the first basis. The plurality of scaled roots is added to produce error locations for the polynomial. | 2011-06-16 |
20110145678 | DATA LINE STORAGE AND TRANSMISSION UTILIZING BOTH ERROR CORRECTING CODE AND SYNCHRONIZATION INFORMATION - Methods and apparatuses for including synchronization data to be used for parallel processing in a block of data having error correcting code symbols. The block of data is encoded using an error correcting code. The resulting encoding includes three check symbols per 32 data symbols. At least one synchronization symbol corresponding to the data symbols is generated. The data symbols, the check symbols and the at least one synchronization symbol are combined. The combined data symbols, the check symbols and the at least one synchronization symbol are transmitted. | 2011-06-16 |
20110145679 | Validating Data Using Processor Instructions - In one embodiment, the present invention includes a method for determining from a data block in a buffer a number of first operands in a first portion of the buffer and a number of second operands in a second portion of the buffer. Based on these numbers, a cyclic redundancy checksum (CRC) operation may be iteratively performed on the first and second operands to obtain a checksum result. The first and second operands are of a different length, and the checksum operation may be executed using processor instructions corresponding to the different lengths. Other embodiments are described and claimed. | 2011-06-16 |
20110145680 | Disk Drive and Method for Data Conversion Process in a Disk Drive - A disk drive for encrypting user data. A motor configured to rotate a disk which stores encoded user data and an encryption flag which has not been encoded. An encoder/decoder processor configured to encode the user data that is written into the disk without encoding the encryption flag, and decodes the user data that is read out from the disk without decoding the encryption flag that is read out from the disk. An encryption processor configured to encrypt the user data at the encryption flag, wherein the encryption flag indicates encryption before the encoder/decoder processor starts encoding, and wherein the encryption processor obtains an encryption flag read out from the disk before the encoder/decoder processor completes decoding of the user data read out from the disk, commencing decryption of decoded data where the encryption flag indicates encryption before decoding of the user data is complete. | 2011-06-16 |
20110145681 | SOFT DECODING FOR QUANTIZIED CHANNEL - Systems, methods, and other embodiments associated with soft decoding for a quantized channel are described. According to one embodiment, an apparatus includes a soft decoder configured to decode a signal received from a quantized channel based, at least in part, on one or more log likelihood ratios (LLRs). The apparatus may also include a reliability memory configured to store one or more known LLRs, and a controller configured to repetitively and selectively provide the soft decoder with known LLRs chosen from the reliability memory, to control the soft decoder to decode the signal, and to selectively update the reliability memory upon determining that the soft decoder successfully decoded the signal. | 2011-06-16 |
20110145682 | TRANSMITTING SYSTEM AND METHOD OF TRANSMITTING DIGITAL BROADCAST SIGNAL IN TRANSMITTING SYSTEM - A transmitting system and a method of transmitting digital broadcast signal are disclosed. This invention extends a region for mobile service data in a slot. Thus, the transmitter can transmit more mobile service data. This invention has an advantage enhancing the reception performance of a broadcast signal at a reception system, and a method for processing a broadcast signal by inserting additional known data in regions C, D and E. | 2011-06-16 |
20110145683 | Instruction-set architecture for programmable cyclic redundancy check (CRC) computations - A method and apparatus to perform Cyclic Redundancy Check (CRC) operations on a data block using a plurality of different n-bit polynomials is provided. A flexible CRC instruction performs a CRC operation using a programmable n-bit polynomial. The n-bit polynomial is provided to the CRC instruction by storing the n-bit polynomial in one of two operands. | 2011-06-16 |
20110145684 | TRANSPARENT ENVELOPE FOR XML MESSAGES - Transforming portions of a message to a destination via a communication protocol. A message is received. It is detected whether the received message includes an encoded envelope. The encoded envelope includes a stack defining parameters including information for handling the received message in an original format. If the received message includes the encoded envelope, the defined parameters are transformed to coded parameters in a common format. The coded parameters express the same information for handling the received message in the communication protocol. The encoded envelope is encapsulated in the received message, and the received message in the common format is delivered to the destination. If the received message does not include an encoded envelope, coded parameters are generated in the common format for the received message by encoding addressing information from the received message. The received message having the coded parameters in the common format is delivered to the destination. | 2011-06-16 |
20110145685 | TRANSPARENT ENVELOPE FOR XML MESSAGES - Transforming portions of a message to a destination via a communication protocol. A message is received. It is detected whether the received message includes an encoded envelope. The encoded envelope includes a stack defining parameters including information for handling the received message in an original format. If the received message includes the encoded envelope, the defined parameters are transformed to coded parameters in a common format. The coded parameters express the same information for handling the received message in the communication protocol. The encoded envelope is encapsulated in the received message, and the received message in the common format is delivered to the destination. If the received message does not include an encoded envelope, coded parameters are generated in the common format for the received message by encoding addressing information from the received message. The received message having the coded parameters in the common format is delivered to the destination. | 2011-06-16 |
20110145686 | TERM-SPECIFIC NAVIGATION SYSTEM AND METHOD FOR INFORMATION SEARCHING - A term-specific navigation method and system is provided for information searching by a user of an Internet browser, that modifies, by using a processor, a copy of Internet content identified as a result of a specific user's search to mark in that copy the locations of a user's search terms; and provides the user with one or more links that will direct the user's browser to the locations in the copy where the user's specific terms were found. | 2011-06-16 |
20110145687 | Method and System For enabling Access To Data Files Unsupported by A Computing Device - A computer implemented method, apparatus, and computer program product for managing access to data files. A first computer device sends a data file to a web server which hosts the data file. Responsive to sending the data file to the web server, the first computer device receives from the web server a web page link to the data file hosted at the web server. The first computer device creates, in a web browser application in the first computer device, a bookmark associated with the web page link. The first computer device then synchronizes the bookmarks in its web browser application with the bookmarks in the web browser application of a second computer device to allow a bookmark associated with the web page link to also be created in the web browser application of the second computer device. | 2011-06-16 |
20110145688 | APPARATUS AND METHOD FOR PROVIDING BOOKMARK SERVICE IN COMMUNICATION TERMINAL - An apparatus and a method for providing a bookmark service in a communication terminal are provided. The method includes accessing a website, determining whether a favicon exists in the accessed website, and when the favicon exists in the website, setting the favicon as a bookmark of the website. | 2011-06-16 |
20110145689 | NAMED OBJECT VIEW OVER MULTIPLE FILES - A named object view report is generated from different electronic object sources. The object sources may be associated with different users and have different access rights. The different object sources from which the objects are obtained may be determined using a variety of methods. A user at a client is presented with the named object view report such that the user's attention is focused on the different objects that are obtained from the different object sources as if the objects were obtained from a single object source. The user may be used to cycle through the objects that are obtained from the different object sources. When an object is edited within the report by a user that is not associated with the user for editing, that object is copied to an object source that is owned by the user. | 2011-06-16 |
20110145690 | SYSTEM AND METHOD FOR SIMULTANEOUS DISPLAY OF MULTIPLE TABLES - In a system and method for displaying hierarchically related data, a processor may display in a single display window of a display device respective representations of a plurality of hierarchically related data records in accordance with the hierarchical relationship, where each of at least two of the representations includes a respective table including a plurality of data columns, and where the display of some of the columns of the tables is in accordance with display settings set based on a determination that columns of different tables correspond to each other for alignment. | 2011-06-16 |
20110145691 | Method for Sequenced Document Annotations - A method for sequenced document annotation is disclosed. The method includes linking a first annotation to a document, where the first annotation is defined by a first primary graphic and a first sequence identifier. Thereafter, a first value is assigned to the first sequence identifier, and the first primary graphic and the first sequence identifier are displayed. After incrementing the first value to a second value, a second annotation is linked to the document. The second annotation is defined by a second sequence identifier and a second primary graphic identical to the first primary graphic. The second sequence identifier is assigned an incremented second value, and the second primary graphic and the second sequence identifier are displayed. | 2011-06-16 |
20110145692 | Method for Tracking Annotations with Associated Actions - A method for tracking annotations on a document is contemplated. A first annotation defined by a plurality of first annotation attributes is received. Thereafter, a primary visual representation of the first annotation is generated according to the first annotation attributes. The method continues with associating an action identifier with the first annotation as an action link. A thumbnail representation of the first annotation is generated in a toolbox window. A second annotation defined by a plurality of second annotation attributes and associated with the action identifier derived from the action link for the first annotation is linkable to the document in response to a selection input of the thumbnail representation of the first annotation. | 2011-06-16 |
20110145693 | TRANSFER OF DIGITAL MEDICAL IMAGES AND DATA - A system for distributing images creates a self-sufficient, self-consistent medical imaging and other medical information transfer file that contains image files and corresponding data sets that are bundled with an image viewer application. The medical image and data transfer file is prepared using object serialization and contains a deserialization application. The transfer file is created at an origination location and transmitted to a destination device as a packaged file over a computer network. The destination device receives the packaged file from the origination location and executes the viewer application with the image files and the data sets by opening the packaged file alone, without the need to run any other imaging/viewer application at the destination device. The viewer application has image viewing panes, an annotation tool, and image manipulation tools. | 2011-06-16 |
20110145694 | Method and System for Transforming an Integrated Webpage - A method and system for transforming an integrated webpage into native text and image representations. A webpage containing an embedded object is loaded into a browser. A portable text representation of an image of the embedded object is captured by invoking the embedded object to rasterize itself. The portable text representation is then streamed to a web server and converted to a native image representation. A URL is generated for the native image representation and the embedded object on the integrated webpage is replaced with its native image representation. | 2011-06-16 |
20110145695 | WEB PAGE CONVERSION SYSTEM - Efficiency of user operation is improved. To achieve this, a web page conforming to a request from a mobile telephone is converted to a web page image represented as one frame of an image. An image file representing the web page image is transmitted to the mobile telephone. Displayed on the display screen of the mobile telephone are image portions displayed in accordance with a sequence in which the user of the web page image applies commands. The user is capable of applying commands in regular order without moving the image in order to display a desired image portion on the display screen. | 2011-06-16 |
20110145696 | SERVER SIDE WEB BROWSING AND MULTIPLE LENS SYSTEM, METHOD AND APPARATUS - A user may access a host server and receive display information within a single browser window. The display information includes at least one lens, wherein each lens controls server side web browsing and allows the user to view a separate web page from the Internet. The host server provides personalized web browsing capability specific to a particular user independent of the browser, device or location of the user. After the user submits a request to view a particular web page, the web page information is retrieved by the host server and transmitted to the user for display within a selected lens. Each lens controls server-side web browsing through independent navigational controls, such as a horizontal and vertical scroll bar, a resize button and the like. One lens may also control the web content displayed in another lens. The host server may reformat entire web pages so that they can be displayed within a lens without the need for scrolling. Additionally, each lens may have multiple cookies associated therewith. Users may further submit bookmarks which are applicable to one or more of the lenses. Bookmarks may be recognized through initiating a single command. | 2011-06-16 |
20110145697 | DEVICE FOR SCENE PRESENTATION OF STRUCTURED INFORMATION - A method for performing presentation with reference to structured information existing in an internal or external is defined. A scene presentation device may present a scene with reference to the structured information based on the defined method. | 2011-06-16 |
20110145698 | GENERATING STRUCTURED DATA OBJECTS FROM UNSTRUCTURED WEB PAGES - A method described herein includes receiving data that identifies a web page, wherein the data that identifies the web page is desirably displayed to a first individual and resolving the web page to generate a markup language document, wherein the markup language document comprises unstructured data. The method also includes extracting portions of the markup language document and generating a structured data object, wherein the structured data object includes the portions of the markup language document. The method further includes causing a summary of the web page to be displayed to the first individual, wherein the summary of the web page is based at least in part upon the structured data object. | 2011-06-16 |
20110145699 | ANNOTATION DRIVEN REPRESENTATIONAL STATE TRANSFER (REST) WEB SERVICES - Techniques for annotation driven Representational State Transfer (REST) web services are presented. A platform-independent World-Wide Web application is annotated to expose the methods of the application when accessed via a WWW site. The methods are described when rendered via a WWW site in a REST compliant format (RESTful). | 2011-06-16 |
20110145700 | STRUCTURED DOCUMENT ANALYSIS APPARATUS AND STRUCTURED DOCUMENT ANALYSIS METHOD - When a structured document includes a compressed structure channel, a structured document analysis apparatus decompresses the structure channel. The structured document analysis apparatus generates an event list including structure information (events) of the structured document, and reference information (block numbers, channel numbers, value numbers) that refers to values. The structured document analysis apparatus notifies an application program of contents of the event list. Subsequently, when the user application requests a value, if the value is compressed, the structured document analysis apparatus decompress the value and notifies the application program of the value. | 2011-06-16 |
20110145701 | METHOD AND APPARATUS FOR DETECTING PAGINATION CONSTRUCTS INCLUDING A HEADER AND A FOOTER IN LEGACY DOCUMENTS - A method for identifying header/footer content of a document, in order to sequence text fragments comprising recognizable text blocks as derived from the document. The textual variability of lines comprised of text blocks, including the different kinds of text blocks within the line is analyzed for assessment of textual variability. Header/footer zones are defined by textual content having a low textual variability. An alternative embodiment identifies pagination constructs by comparing selected text-boxes for similarity and proximity and clustering the text boxes satisfying a predetermined similarity value, wherein the clustered text boxes are deemed to comprise pagination constructs. | 2011-06-16 |
20110145702 | DOCUMENT USE MANAGING SYSTEM, DOCUMENT PROCESSING APPARATUS, MANIPULATION AUTHORITY MANAGING APPARATUS, DOCUMENT MANAGING APPARATUS AND COMPUTER READABLE MEDIUM - In response to an instruction to copy data from a first electronic document to a second electronic document, a protected document generating section of a document processing apparatus newly generates a third electronic document as a copying result. A combining requesting section requests combining of pieces of manipulation authority information (policies) to be applied to the first and second electronic documents, respectively. In response to the request, a policy combining section of a policy managing apparatus combines the two pieces of manipulation authority information together into third manipulation authority information. A protected document registering section registers the third electronic document and the third manipulation authority information in a document DB. | 2011-06-16 |
20110145703 | Interactive Programming Mechanism - A method disclosed. The method includes receiving a menu option selection from a function generator window within a graphical user interface (GUI), generating programming code having a function corresponding to the menu option selection and displaying the programming code at a preview window within the GUI. | 2011-06-16 |
20110145704 | PROVIDING MULTIPLE VIEWS OF A BUSINESS PROCESS DEFINITION TO DIFFERENT VIEWS - In one embodiment, a method for providing multiple views of a business process definition includes storing a model of a business process, and providing different view points of the model to different classes of users. | 2011-06-16 |
20110145705 | CONTROL METHOD OF USER INTERFACE - This invention provides a method for controlling a user interface of an electronic device. The electronic device has a touch screen. The control method includes the following steps. A first area and a second area are defined on the touch screen. A plurality of options of a first group are displayed in the second area. An operation of a user in the second area is determined. If the operation is a click, contents corresponding to one of the options of the first group clicked by the user are displayed in the first area. If the operation is a slide, a plurality of options of a second group are displayed in the second area, while an image displayed in the first area is unchanged. | 2011-06-16 |
20110145706 | CREATING VIRTUAL REPLICAS OF PHYSICAL OBJECTS - The present invention extends to methods, systems, and computer program products for creating virtual replicas of physical objects. A computer system detects that a portion of a physical object has come into the physical vicinity of a portion of a multi-touch input display surface. The computer system accesses object identifying data corresponding to the object. The computer system uses the object identifying data to access image data for the object from a repository of stored image data. The computer system uses the at least the accessed image data to generate a virtual replica of the object. The computer system presents the virtual replica of the object at a location on the multi-touch input display surface where the portion of the object was detected. | 2011-06-16 |
20110145707 | COMPUTER-IMPLEMENTED METHOD AND SYSTEMS FOR ASSISTING A USER IN APPLYING A BUSINESS PROCESS PATTERN - A computer-implemented method for assisting a user in applying a business process pattern. In some embodiments, the computer-implemented method includes providing a graphical user interface (GUI) adapted for displaying a first representation of a business process and for allowing user editing of the business process. The computer-implemented method also includes receiving a user selection of a fragment of the business process as displayed in the first representation. In some embodiments, the computer-implemented method includes calling a second representation of the business process, the second representation including a hierarchy of fragments of business process, and checking whether the fragment selected by the user corresponds to one of the fragments of the second representation. The computer-implemented method may also include instantiating a business process pattern using the selected fragment if the fragment selected corresponds. The selected fragment is re-usable within the business process pattern. | 2011-06-16 |
20110145708 | AUTOMATED AUDIO OR VIDEO SUBSET NETWORK LOAD REDUCTION - A multimedia data stream including an audio data stream and a video data stream is received from a server at a computing device. An audio output signal for the audio data stream and a video output signal for the video data stream are generated. A user interface action that blocks output of one of the audio data stream and the video data stream is detected via the computing device. A multimedia traffic reduction request is sent to the server instructing the server to stop transmission of a portion of the multimedia data stream associated with the blocked output of one of the audio data stream and the video data stream. | 2011-06-16 |
20110145709 | APPARATUS AND METHOD FOR DIGITAL IMAGE PROCESSING USING SLIDESHOW FUNCTION - An image processing apparatus having a slideshow function includes: a storage unit that stores files corresponding to a plurality of images; a display unit that displays the plurality of images; a slideshow performing unit that reads the files from the storage unit and sequentially displays the plurality of images on the display unit in a slideshow function; a user input unit that receives input manipulation of a user and generating a signal; and an image processor that performs image processing on the files corresponding to images selected from the plurality of images displayed on the display unit based on the signal of the user input unit after the slideshow performing unit completes the slideshow function. | 2011-06-16 |
20110145710 | FRAMEWORK TO VISUALIZE NETWORKS - A system or method to provide efficient visualization and manipulation of investigative case management (ICM) networks. An entry point into the network is defined. The system accepts a network view definition from a user. The network is filtered based on the view definition and on a filtered view is displayed to a user. | 2011-06-16 |
20110145711 | Method And Apparatus For Exercising And Debugging Correlations For Network System - A selected time interval of previously stored events generated by a number of computer network devices are replayed and cross-correlated according to rules. Meta-events are generated when the events satisfy conditions associated with one or more of the rules. The rules used during replay may differ from prior rules used at a time when the events occurred within a computer network that included the computer network devices. In this way, new rules can be tested against true event data streams to determine whether or not the rules should be used in a live environment (i.e., the efficacy of the rules can be tested an tor debugged against actual event data). | 2011-06-16 |
20110145712 | INFORMATION EXCHANGE USING GENERIC DATA STREAMS - Systems and methods for information exchange using generic data streams, wherein a data stream is sent from one computer system to another, and the receiving computer system is not aware of the structure of the information in the data stream. A header of the data stream includes a description of a data object. A body of the data stream includes information for instances of a data object stored on a computer system. The object is compliant with the description provided in the header of the data stream. The information in the body of the stream is extracted based on the description provided in the header of the data stream. A user interface (UI) is dynamically created based on the description of data object to display portions of the received information, and further to allow a user to change the information. | 2011-06-16 |
20110145713 | SYSTEMS AND METHODS FOR FACILITATING ELECTRONIC COMMERCE OVER A NETWORK - In accordance with embodiments of the present disclosure, systems and methods for facilitating electronic commerce over a network include communicating with a plurality of users via a plurality of user devices over the network, receiving a login request from a first user via a first user device over the network, accessing an account related to the user based on information passed with the login request, receiving a snaplist file related to a multiple image listing provided by the first user via the first user device, processing the snaplist file by extracting the multiple image listing from the snaplist file, and displaying the multiple image listing to one or more other users via one or more other user devices. | 2011-06-16 |
20110145714 | SYSTEM AND METHOD FOR WEB-INTEGRATED STATISTICAL ANALYSIS - A method and system for performing statistical analysis using a web browser includes selecting raw data for statistical analysis and specifying statistical operation(s) on the raw data. The web browser may be used to generate first program code corresponding to the statistical operation(s). After sending the first program code to a web server for execution, output data resulting from executing the first program code may be received at the web browser. The web browser may generate and display a graphical representation of the output data. The web browser may also be used to configure the graphical representation and generate second program code executable by a web browser for generating the graphical representation. | 2011-06-16 |
20110145715 | WEB TRANSACTION ANALYSIS - Individual network activities are correlated to interactions with a target web page to facilitate an analysis of the performance of the web page. This correlation is preferably performed using a combination of heuristics and rules developed to filter network activities into those activities that are likely to have been caused by the particular transaction, and those that are unlikely to be associated with that transaction. The activities that are identified as being associated with the transaction are subsequently organized to identify a time-flow of these activities within the transaction, from which performance statistics can be determined and presented to a user. Because the individual activities within the transaction are identified and time-ordered, an analysis of the effects of each activity on the overall performance of the web page can be performed to identify potential problem areas, or to diagnose reported problems. | 2011-06-16 |
20110145716 | SYSTEM AND METHOD FOR AUTOMATING THE TRANSFER OF DATA FROM A WEB INTERFACE TO A DATABASE OR ANOTHER WEB INTERFACE - Access information is received for a data sender interface accessible over a network and a data receiver interface accessible over the network. A set of navigation steps necessary to access data fields on the sender interface are determined. The data fields on the data sender interface are automatically mapped to data fields on the data receiver interface using at least one data mapping rule, such that a set of data field mappings is created. A data transfer scenario is generated using the set of navigation steps and the set of data field mappings, such that the data transfer scenario specifies a set of operations for transferring data from the sender interface to the receiver interface. The data transfer scenario is stored to computer readable media and can be executed any number of times to transfer data from the sending interface to the receiving interface. | 2011-06-16 |
20110145717 | WEB-BROWSING SYSTEM - A web-browsing system that enables a user to surf the web efficiently. The web-browsing system which can be installed in a client's terminal comprises: a web-browser; a function window controller that includes a function window manager consisting of a contents-information DB, a layer creator and a menu controller; and a window module that has a web-browser link unit. The contents-information DB stores at least one kind of contents among text, image, video or sound source and the contents information linked to the correspondent contents. | 2011-06-16 |
20110145718 | METHOD AND APPARATUS FOR PRESENTING A FIRST-PERSON WORLD VIEW OF CONTENT - An approach is provided for presenting a global view of content. A content mapping platform receives an access address of content, the content including location information. The content mapping platform then determines availability information of the content by causing, at least in part, detection of the content at the access address and causing, at least in part, presentation of the content on a user interface of a user device indicating the location information based on the availability information of the content. | 2011-06-16 |
20110145719 | PEOPLE RECOMMENDATION INDICATOR METHOD AND APPARATUS IN A SOCIAL NETWORKING SITE - An indicator method and system recommends people in a computerized social networking site. Indicators in a user interface indicate user-relatedness and/or connectedness information between a given user and other people of the social networking site. The user interface employs the indicators to consistently make people recommendations to the given user. The indicators may be visual including symbolic, graphically illustrative and recommendation score (extent) indicating. The user interface places and displays the indicator at each occurrence of the recommended person's name and/or image throughout each pertinent screen view/page of the social networking site. | 2011-06-16 |
20110145720 | Feeds for Address Books - A feed system for an address book includes a news feed module and a sales feed module. The news feed module accesses news sources to find related news articles as a function of data in an address book. The sales feed module accesses sales sources to find related sales items as a function of the data in the address book. At least one of the news feed module and the sales feed module forwards the related news articles and the related sales items, respectively, to the address book to be displayed. | 2011-06-16 |
20110145721 | SYSTEM AND METHOD FOR USING A WEBPAD TO CONTROL A DATA STREAM - A system and method for using a webpad to select a target device which is to receive from a source device a stream of a digital representation of a media. The webpad is used to send a transmission to the source device to cause the source device to route the stream of the digital representation of the media to the target device where the target device decodes and converts the digital representation of the media into analog signals to thereby allow for a reproduction of the media | 2011-06-16 |
20110145722 | Image forming apparatus and method for providing local user interface thereof - A method for providing a local user interface of an image forming apparatus is provided. The method includes supplying power to the image forming apparatus, requesting at least one of a first template and first variable data which make up a home screen of the local user interface, creating the home screen corresponding to the at least one of the first template and the first variable data, and displaying the created home screen on the local user interface. | 2011-06-16 |
20110145723 | SYSTEM AND METHOD FOR REDIRECTING CLIENT-SIDE STORAGE OPERATIONS - A method and system for redirecting client-side storage operations to a remote storage device. A user agent module executing on a client device receives a hypertext transfer protocol (HTTP) message that includes a client-side storage operation directed to a client storage device. The user agent module detects the client-side storage operation and accesses defined criteria to identify one or more remote storage devices on which to implement the remote storage device in lieu of the client storage device. The user agent module then implements the client-side storage operation on the remote storage device. | 2011-06-16 |