Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: computer memory





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,292,887 Reducing transmissions of measurements of affective response by identifying actions that imply emotional response
A system, method, and computer product for reducing volume of transmissions of measurements of affective response are described herein. In one embodiment, an...
US-9,292,773 Image display apparatus, printing system, and program configured to print image projected by the image display...
The printing system includes a computer and an image display apparatus. When receiving the printing condition from the image display apparatus, the computer...
US-9,292,767 Decision tree computation in hardware utilizing a physically distinct integrated circuit with on-chip memory...
A computing device for use in decision tree computation is provided. The computing device may include a software program executed by a processor using portions...
US-9,292,712 Method and apparatus for maintaining secure time
An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE),...
US-9,292,709 Computing a checksum for content in local storage
Systems and methods for computing a checksum are provided. In some aspects, an online application code module is written in a first programming language. The...
US-9,292,685 Techniques for autonomic reverting to behavioral checkpoints
Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or...
US-9,292,684 Systems and methods for security in computer systems
Systems and methods are provided for the prevention and mitigation of security attacks in computer systems. Virtualization technology is provided and leveraged...
US-9,292,679 Regulating access to and protecting portions of applications of virtual machines
Embodiments of apparatus, computer-implemented methods, systems, and computer-readable media are described herein for a virtual machine manager, wherein the...
US-9,292,628 Systems and methods for generating models of a dataset for a data visualization
A method of generating a statistical model for a dataset operates at a computer system having one or more processors and memory. The memory stores one or more...
US-9,292,571 Joining database tables
In one implementation, a query is received that is related to data stored in a database that is implemented in computer memory. Based on the received query,...
US-9,292,457 Networking cloud and method of using the same
A cloud computing network device is disclosed. The device is configured to generate output data based on input data, wherein the output data is indicative of...
US-9,292,452 Identification of page sharing opportunities within large pages
Memory performance in a computer system that implements large page mapping is improved even when memory is scarce by identifying page sharing opportunities...
US-9,292,446 Speculative prefetching of remote data
A profiler may identify potentially-independent remote data accesses in a program. A remote data access is independent if value returned from said remote data...
US-9,292,439 Method, device and computer program for identifying items having high frequency of occurrence among items...
A method, device and computer program for efficiently identifying items having a high frequency of occurrence among items included in a large-volume text data...
US-9,292,427 Modifying memory space allocation for inactive tasks
Provided are a computer program product, system, and method for modifying memory space allocation for inactive tasks. Information is maintained on computational...
US-9,292,414 System, method, and computer program product for debugging graphics programs locally utilizing a system with a...
A system, method, and computer program product are provided for debugging graphics programs via a system with a single graphics processing unit. The method...
US-9,292,379 Apparatus and method to manage high capacity storage devices
Apparatus, systems, and methods to manage high capacity memory devices are described. In one example, a controller comprises logic to receive a write operation...
US-9,292,359 System and method for memory management
A system and method for automatic memory management of a shared memory during parallel processing of a web application. The system includes a computing system...
US-9,292,356 Thread processing on an asymmetric multi-core processor
An ASMP computing device is provided, which comprises one or more computing components, which themselves comprise a plurality of processing units and one or...
US-9,292,340 Applicaton interface on multiple processors
A method and an apparatus that execute a parallel computing program in a programming language for a parallel computing architecture are described. The parallel...
US-9,292,321 System, method and computer-readable recording medium for synchronous script lazy loading
A synchronous script lazy loader generates a plurality of virtual functions. Each one of the plurality of virtual functions corresponds to one of a plurality of...
US-9,292,294 Detection of memory address aliasing and violations of data dependency relationships
Method and apparatus to efficiently detect violations of data dependency relationships. A memory address associated with a computer instruction may be obtained....
US-9,292,289 Enhancing reliability of transaction execution by using transaction digests
Performing a transaction in a transactional memory environment for performing transactional executions, the transactional memory environment including a...
US-9,292,261 Revision management tools for a multi-user CAx environment
A system for collaborating on a component includes a computing device having a memory and a processor, the computing device configured to execute a first...
US-9,292,228 Selective raid protection for cache memory
A RAID controller includes a cache memory in which write cache blocks (WCBs) are protected by a RAID-5 (striping plus parity) scheme while read cache blocks...
US-9,292,215 Managing virtual hard disk snapshots
A method, system or computer usable program product for managing virtual disk snapshots including utilizing a processor to create multiple disk containers...
US-9,292,214 Systems and methods for migrating data
Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN)...
US-9,292,210 Thermally sensitive wear leveling for a flash memory device that includes a plurality of flash memory modules
Thermally sensitive wear leveling for a flash memory device that includes a plurality of flash memory modules, the flash memory device included in a computing...
US-9,290,873 Sewing machine, information processing apparatus, and non-transitory computer-readable medium
A sewing machine includes a processor and a memory. The memory stores a plurality of embroidery data which respectively corresponds to a plurality of embroidery...
US-9,290,871 Apparatus and non-transitory computer-readable medium storing computer-readable instructions
An apparatus includes a processor and a memory configured to store computer-readable instructions. The computer-readable instructions, when executed by the...
US-9,288,827 Wireless communication devices, communication systems, methods, and non-transitory computer-readable media for...
Wireless communication devices operate selectively statuses including a master-station status and a slave-station status and include processors and memories...
US-9,288,751 Use of position data to select wireless access point
A mobile computing device comprises a radio frequency transceiver, a memory, and processing circuit. The radio frequency transceiver is configured to...
US-9,288,744 Method and apparatus for sharing connectivity settings via social networks
An apparatus for enabling sharing of one or more connectivity parameters with one or more friends may include a processor and memory storing executable computer...
US-9,288,695 System, method and device for testing mobile telephone call performance
A system and method of testing call performance of a plurality of mobile telephones is provided. In one embodiment the method comprises storing in a memory of a...
US-9,288,528 Modularized control system to enable networked control and sensing of other devices
This invention provides a standard method of interfacing an arbitrary non-network connected device to computer networks such as the Internet. The invention...
US-9,288,305 Method and apparatus for monitoring a characteristic of an object in mechanical contact with a mobile terminal
An apparatus comprising at least one processor and at least one memory including computer program code the at least one memory and the computer program code...
US-9,288,256 URL prefetching
An enhanced tag management system is disclosed comprising a networked resource/asset prefetch feature. In some examples, the tag management system comprises a...
US-9,288,178 Inventory updating of an internet protocol (IP) alias within a highly available computing cluster
A clustered computing data processing system can be configured for inventory management in a highly available cluster. The system can include a cluster of...
US-9,288,177 Inventory updating of an internet protocol (IP) alias within a highly available computing cluster
A clustered computing data processing system can be configured for inventory management in a highly available cluster. The system can include a cluster of...
US-9,288,172 Access restriction device, access restriction method, computer readable storage medium
An access restriction device including a processor; and a memory. The processor executes: receiving an email from a transmission source; specifying including...
US-9,288,169 Methods, systems, and computer program products for clustering and communicating between internet protocol...
Methods, systems, and computer program products for clustering and communicating between Internet protocol multimedia subsystem (IMS) entities and for...
US-9,287,005 Detecting missing write to cache/memory operations
Using an "optimized" test case for testing hardware and/or software of a computer. The optimized test case is designed to be run on a data storage device...
US-9,286,885 Method of generating speech from text in a client/server architecture
In a method of generating speech from text the speech segments necessary to put together the text to be output as speech by a terminal are determined; it is...
US-9,286,879 Localization of a wireless user equipment (UE) device based on out-of-hearing band audio signatures for ranging
A scheme for localizing a wireless user equipment (UE) device's relative position with respect to a spatial configuration based on audio signatures received via...
US-9,286,592 Methods and systems for access control using a networked turnstile
The present invention is related to systems and methods for providing access control to a venue or other location using a networked system. Described is a...
US-9,286,574 Systems and methods for layered training in machine-learning architectures
A computer-implemented method for layered training of machine-learning architectures includes receiving a plurality of data elements wherein each data element...
US-9,286,552 Image forming apparatus, image forming method, and computer-readable recording medium
An image forming apparatus includes a communication interface unit which receives print data, an image forming unit which prints the received print data, a...
US-9,286,487 Method for protecting confidentiality of a file distributed and stored at a plurality of storage service providers
This method comprises the steps of: --choosing (1) a security parameter n,--segmenting (2) the file in n chunks S1, . . . , Sn, --randomly choosing (3) n.sup.2...
US-9,286,450 Self-selected user access based on specific authentication types
Embodiments of the invention are directed to a system, method, and a computer program product self-selected user access based on specific authentication types....
US-9,286,428 Boundary based power guidance for physical synthesis
A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.