Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: computer memory





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,298,612 Semiconductor memory device and computer system including the same
A semiconductor memory device includes a first memory block of a first type of memory; and a second memory block of a second type of memory having a different...
US-9,298,607 Access control for non-volatile random access memory across platform agents
A controller is used in a computer system to control access to an NVRAM. The computer system includes a processor coupled to a non-volatile random access memory...
US-9,298,585 Blacklisting of fault generating software code
Techniques for blacklisting of fault generating software code are provided. An example method includes receiving crash reports of a plurality of browsers, a...
US-9,298,536 Creating an operating system dump
Creating an operating system dump. A main memory of a computer system is divided into at least three contiguous memory areas, comprising a primary memory area,...
US-9,298,528 Evaluating and servicing problematic cash-handling machines
A method of tracking repeated performance problems in a machine is disclosed. The method comprises storing the faults in a computer memory, and assigning a...
US-9,298,458 Performance of emerging applications in a virtualized environment using transient instruction streams
A method, system and computer-usable medium are disclosed for managing transient instruction streams. Transient flags are defined in Branch-and-Link (BRL)...
US-9,298,432 Systems and methods for performing hooking in a jitted environment
A computing device configured for replacing a target method in intermediate language code is described. The computing device includes a processor. The computing...
US-9,298,395 Memory system connector
According to one embodiment a memory system includes a circuit card and a separable area array connector on the circuit card. The system also includes a memory...
US-9,298,376 Scheduling of I/O in an SSD environment
A system and method for effectively scheduling read and write operations among a plurality of solid-state storage devices. A computer system comprises client...
US-9,298,228 Memory capacity expansion using a memory riser
A computing system having a memory riser sub-system. The computing system includes a motherboard with a memory module connector and a riser card inserted into...
US-9,298,084 Preventing double patterning odd cycles
A method, system or computer usable program product for preventing odd cycles caused by design modifications to a double patterning layout including utilizing a...
US-9,295,413 Fitness monitor
A fitness monitor comprises a housing, a wrist band, a motion sensor, a display, a non-transitory memory element and a processing element. The wrist band is...
US-9,295,139 Light control system, light control method and computer readable memory
A plurality of lighting devices are respectively arranged, on a ceiling surface, at a plurality of grid points of the ceiling surface partitioned in a grid...
US-9,295,065 Systems and methods for coordinating transmission of data packets based on frame type detection in a base station
A system, method, base station, and computer program product for coordinating communication of data packets between a user device and an application server is...
US-9,294,962 Apparatus and method to allocate communication resources in a communication system
An apparatus, system and method for providing interference cancellation and communication resource reservation limits to allocate communication resources in a...
US-9,294,931 Co-primaryspectrum sharing for 4G/5G small cell base stations with long term fairness criteria
An apparatus includes one or more processors and one or more memories including computer program code. The one or more memories and the computer program code...
US-9,294,895 Caching at the wireless tower with remote charging services
A RAN based data processing system is configured for content caching with remote charging services. The system can include a base station that includes an...
US-9,294,870 Communication device and non-transitory computer-readable recording medium
A communication device may include an NFC interface configured to perform communication by using a NFC system and a controller. The controller may include a...
US-9,294,568 Providing electronic content to residents of controlled-environment facilities
Systems and methods for providing electronic content and applications to residents of controlled-environment facilities are disclosed. The portable computing...
US-9,294,508 Automated multi-level federation and enforcement of information management policies in a device network
Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on...
US-9,294,481 System and method for tokenless biometric authorization of electronic communications
This invention is a method and system for tokenless biometric authorization of an electronic communication, using a biometric sample, a master electronic...
US-9,294,478 Hardware-based device authentication
An opportunity for a computing device to participate in a secure session with a particular domain is identified. A domain identifier of the particular domain is...
US-9,294,430 Method of enabling digital music content to be downloaded to and used on a portable wireless computing device
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device...
US-9,294,412 Controller area network (CAN) worst-case message latency with priority inversion
This application discloses determining a worst-case latency in a controller area network (CAN) for messages experiencing priority inversion within individual...
US-9,294,392 Identifying, translating and filtering shared risk groups in communications networks
A method, apparatus, and computer-readable storage medium for processing shared risk group (SRG) information in communications networks are disclosed. The...
US-9,294,287 Interrogating an authentication device
Methods, systems, and computer programs for interrogating an authentication device are disclosed. For example, a mobile device can include an interrogator...
US-9,294,097 Device array topology configuration and source code partitioning for device arrays
An array of field programmable gate array (FPGA) devices configured for execution of a source code. The array includes two or more FPGA devices, a host...
US-9,292,944 System and method for computing an image
Disclosed are a system and method for computing a picture. Instead of loading a file that contains the image from memory, the present invention provides for a...
US-9,292,887 Reducing transmissions of measurements of affective response by identifying actions that imply emotional response
A system, method, and computer product for reducing volume of transmissions of measurements of affective response are described herein. In one embodiment, an...
US-9,292,773 Image display apparatus, printing system, and program configured to print image projected by the image display...
The printing system includes a computer and an image display apparatus. When receiving the printing condition from the image display apparatus, the computer...
US-9,292,767 Decision tree computation in hardware utilizing a physically distinct integrated circuit with on-chip memory...
A computing device for use in decision tree computation is provided. The computing device may include a software program executed by a processor using portions...
US-9,292,712 Method and apparatus for maintaining secure time
An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE),...
US-9,292,709 Computing a checksum for content in local storage
Systems and methods for computing a checksum are provided. In some aspects, an online application code module is written in a first programming language. The...
US-9,292,685 Techniques for autonomic reverting to behavioral checkpoints
Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or...
US-9,292,684 Systems and methods for security in computer systems
Systems and methods are provided for the prevention and mitigation of security attacks in computer systems. Virtualization technology is provided and leveraged...
US-9,292,679 Regulating access to and protecting portions of applications of virtual machines
Embodiments of apparatus, computer-implemented methods, systems, and computer-readable media are described herein for a virtual machine manager, wherein the...
US-9,292,628 Systems and methods for generating models of a dataset for a data visualization
A method of generating a statistical model for a dataset operates at a computer system having one or more processors and memory. The memory stores one or more...
US-9,292,571 Joining database tables
In one implementation, a query is received that is related to data stored in a database that is implemented in computer memory. Based on the received query,...
US-9,292,457 Networking cloud and method of using the same
A cloud computing network device is disclosed. The device is configured to generate output data based on input data, wherein the output data is indicative of...
US-9,292,452 Identification of page sharing opportunities within large pages
Memory performance in a computer system that implements large page mapping is improved even when memory is scarce by identifying page sharing opportunities...
US-9,292,446 Speculative prefetching of remote data
A profiler may identify potentially-independent remote data accesses in a program. A remote data access is independent if value returned from said remote data...
US-9,292,439 Method, device and computer program for identifying items having high frequency of occurrence among items...
A method, device and computer program for efficiently identifying items having a high frequency of occurrence among items included in a large-volume text data...
US-9,292,427 Modifying memory space allocation for inactive tasks
Provided are a computer program product, system, and method for modifying memory space allocation for inactive tasks. Information is maintained on computational...
US-9,292,414 System, method, and computer program product for debugging graphics programs locally utilizing a system with a...
A system, method, and computer program product are provided for debugging graphics programs via a system with a single graphics processing unit. The method...
US-9,292,379 Apparatus and method to manage high capacity storage devices
Apparatus, systems, and methods to manage high capacity memory devices are described. In one example, a controller comprises logic to receive a write operation...
US-9,292,359 System and method for memory management
A system and method for automatic memory management of a shared memory during parallel processing of a web application. The system includes a computing system...
US-9,292,356 Thread processing on an asymmetric multi-core processor
An ASMP computing device is provided, which comprises one or more computing components, which themselves comprise a plurality of processing units and one or...
US-9,292,340 Applicaton interface on multiple processors
A method and an apparatus that execute a parallel computing program in a programming language for a parallel computing architecture are described. The parallel...
US-9,292,321 System, method and computer-readable recording medium for synchronous script lazy loading
A synchronous script lazy loader generates a plurality of virtual functions. Each one of the plurality of virtual functions corresponds to one of a plurality of...
US-9,292,294 Detection of memory address aliasing and violations of data dependency relationships
Method and apparatus to efficiently detect violations of data dependency relationships. A memory address associated with a computer instruction may be obtained....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.