Follow us on Twitter
twitter icon@FreshPatents


Data Structure patents

      

This page is updated frequently with new Data Structure-related patent applications.




 Telematics support for mobile wireless network service swapping patent thumbnailTelematics support for mobile wireless network service swapping
A method for implementation at a processor of a vehicular telematics unit is described. The method allows data structures formatted to store one or more wireless network communication parameters to be updated in response to a swap of a subscription with one network service provider for a subscription with a different network service provider.
General Motors Llc


 Mobile phone network management systems patent thumbnailMobile phone network management systems
A system and methods for maintaining or optimising a mobile phone network by spatially correlating geolocated radio access network (ran) performance measurement data and geolocated subscriber account data, which in embodiments provides additional technical information on the ran performance. These data are integrated in a spatial data structure and provided with a spatial querying and data correlation system for identifying, and addressing problem areas of the ran..
Actix Limited


 Encoding and decoding selectively retrievable representations of video content patent thumbnailEncoding and decoding selectively retrievable representations of video content
A system and method disposed to enable encoding, decoding and manipulation of digital video with substantially less processing load than would otherwise be required. In particular, one disclosed method is directed to generating a compressed video data structure that is selectively decodable to a plurality of resolutions including the full resolution of the uncompressed stream.
Gopro, Inc.


 Providing visual cues for a user interacting with an automated telephone system patent thumbnailProviding visual cues for a user interacting with an automated telephone system
Visual cues are provided for a user who is using a telephone for interacting with an automated telephone system. A number stream is created from the digits entered by the user with the phone keypad in response to audible prompts from the automated system.
International Business Machines Corporation


 Virtual storage system client user interface patent thumbnailVirtual storage system client user interface
Systems and methods of providing virtual storage spaces (“vss”) are presented. A vss is a virtual representation of a storage space in a database or other data structure with which user(s) who have access to are allowed to interact—in real-time or not—via a vss client u1.
The Digital Marvels, Inc.


 Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems patent thumbnailSystems and methods for correlating and distributing intrusion alert information among collaborating computer systems
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems.
The Trustees Of Columbia University In The City Of New York


 System and  identifying unauthorized activities on a computer system using a data structure model patent thumbnailSystem and identifying unauthorized activities on a computer system using a data structure model
A computer implemented method includes monitoring activity on the virtual machine. A plurality of activities being performed at the virtual machine is identified.
Countertack Inc.


 Configurable generic filter hardware block and methods patent thumbnailConfigurable generic filter hardware block and methods
A configurable generic filter hardware block and corresponding methods are provided. A configurable generic filter hardware block comprises a plurality of multipliers; a plurality of adders; and one or more multiplexers, wherein the configurable generic filter hardware block is configured using a header data structure, the header data structure comprises a pointer to a memory location storing a plurality of input samples, a pointer to a memory location storing a plurality of output samples and a coefficient selection control value.
Lsi Corporation


 Method, device, terminal, and system for audio recording and playing patent thumbnailMethod, device, terminal, and system for audio recording and playing
A recording method includes receiving a mark start instruction in a process of recording audio data and establishing a mark event according to the mark start instruction. The mark event is configured to mark the audio data.
Xiaomi Inc.


 Techniques for overindexing insights for schools patent thumbnailTechniques for overindexing insights for schools
A method can include receiving a request for content including an attribute for a school. The method can analyze a social graph to identify a first set of nodes representing members, which can connect to a first node representing a first school, the social graph can be represented by a graph data structure having nodes representing various entities and edges representing associations between entities.
Linkedln Corporation


Context dependent application/event activation

The system includes a computer-readable memory having a data structure configured to store information about a time-based event for a patient having reduced cognitive abilities, and optionally also electronic data reflecting the patient's cognitive ability. A networked computer system coupled to the computer-readable memory provides an information communicating interface to the patient.
Panasonic Corporation Of North America

Diagnostic computer systems and diagnostic user interfaces

Diagnostic computer systems and diagnostic user interfaces. Embodiments include displaying user interface elements for receiving a diagnosis a medical condition, and receiving the identity of a diagnosis of a particular medical condition.
Orca Health, Inc.

Maintaining a data structure with data set names and pointers to a plurality of catalogs

A plurality of catalogs are maintained, and wherein each catalog of the plurality of catalogs includes data sets and attributes of the data sets. An indication that a new data set is to be defined is received.
International Business Machines Corporation

Embedded document within an application

Data structures, methods, program products and systems for creating and executing an executable file for the binary runtime environment for wireless (brew) where the file is capable of causing presentation of a document embedded in the file on a brew system.. .
Adobe Systems Incorporated

Validating virtual address translation

Systems and methods for validating virtual address translation. An example processing system comprises: a processing core to execute a first application associated with a first privilege level and a second application associated with a second privilege level, wherein a first set of privileges associated with the first privilege level includes a second set of privileges associated with the second privilege level; and an address validation component to validate, in view of an address translation data structure maintained by the first application, a mapping of a first address defined in a first address space of the second application to a second address defined in a second address space of the second application..

Converting numeric-character strings to binary numbers

Improvements to the functioning of computers include algorithms and data structures for specific focal aspects of conversion from character strings to numeric values. Tables used include a doubles10 table, basetbl, tenstbl, and others.

Methods and systems for generating host keys for storage devices

A method of generating one or more host key sets for one or more host devices may comprise: generating one or more node key sets for one or more ancestor nodes in a data structure; generating one or more node key sets for one or more leaf nodes in the data structure by using the one or more node key sets of the one or more ancestor nodes; and/or generating the one or more host key sets for the one or more leaf nodes by reusing the generated one or more node key sets of the one or more ancestor nodes and the node key sets of the one or more leaf nodes.. .
Samsung Electronics Co., Ltd.

Efficient migration of virtual storage devices to a remote node using snapshots

A system, method, and computer program product are provided for performing fast migration of a virtual resource from one node to another node. The method includes the steps of receiving a first request to migrate a resource from a first node to a second node, transmitting a second request to the second node to create a new instance of the resource, collecting a set of changes associated with the resource in a data structure, and transmitting the data structure that includes the set of changes to the second node.
Scale Computing, Inc.

Method of representing a generic format header using continuous bytes and an apparatus thereof

Embodiments of the apparatus for modifying packet headers relate to a rewrite engine that represents each protocol header of packets in a generic format specific to that protocol to enable programmable modifications of packets, resulting in hardware and software flexibility in modifying packet headers. Software programs generic formats in a hardware table for various protocols.
Xpliant, Inc

Cut-through forwarding of ccnx message fragments with ip encapsulation

One embodiment provides a system that facilitates cut-through forwarding of message fragments over a network. During operation, the system receives a packet that corresponds to a fragment of a message and contains a fragment header.
Palo Alto Research Center Incorporated

Web-based publishing of enterprise information

A system and method is described for providing enterprise information to a mobile communications device. The system receives enterprise information from server based application software products at a publisher, and determines particular enterprise data from the enterprise information and integrates the particular enterprise data into a normalised data structure.
Red Rain Corporation Pty Ltd

Incremental update of a shape graph

A router has a shape graph that is a compressed form of a trie that represents routing information for routing data packets in a network, and an update data structure that includes plural entries corresponding to nodes of the shape graph, the plural entries containing count values indicating respective numbers of nodes of the tie represented by the corresponding nodes of the shape graph. The router incrementally updates the shape graph as a portion of the routing information changes, where the incremental updating uses information in the update data structure..
Hangzhou H3c Technologies Co., Ltd

Automated metadata lookup for legacy systems

A method and system for accessing data in a de-commissioned legacy system are provided. Data are automatically extracted from the legacy system, although data structure(s) of the legacy system might not be known, by finding views corresponding to a query for the data.

High-performance streaming dictionary

A method, apparatus and computer program product for storing data in a disk storage system is presented. A high-performance dictionary data structure is defined.
Percona, Llc

System and managing data integrity in electronic data storage

A method for managing data integrity including: receiving a plurality of constraints related to a data structure stored in a data storage component; analyzing each of the plurality of constraints to determine a plurality of conditions based on the plurality of constraints; determining, a plurality of operations based on each of the plurality of conditions, wherein each operation provides for changes in data; and generating code based on the at least one constraint, the conditions and the operations. A system for managing data integrity including: a transmitter module configured to receive a plurality of constraints; a constraint translator module configured to analyze each of the plurality of constraints to determine a plurality of conditions based on the plurality of constraints; an analysis component configured to determine a plurality of operations based on each of the plurality of conditions, wherein each operation provides for changes in data; and wherein the constraint translator module is further configured to generate code..
Auvik Networks Inc.

Analyzing log streams based on correlations between data structures of defined node types

A method by a log stream analysis computer includes identifying records of log streams within a log repository containing a defined term. The log streams are generated by respective software sources executed by the host nodes.
Ca, Inc.

Hash based de-duplication in a storage system

A method for de-duplication, the method may include receiving a request to store in a storage system a received data entity; obtaining a received data entity signature that is responsive to the received data entity; selecting a selected data structure out of a set of data structures that comprises k data structures; wherein k is a positive integer; wherein for each value of a variable k that ranges between 2 and k, a stored data entity signature that is stored in a k'th data structure out of the set collided with stored data entity signatures that are stored in each one of a first till (k−1)'th data structures of the set; calculating an index by applying, on the received data entity signature, a hash function that is associated with the selected data structure; determining whether an entry that is associated with the index and belongs to the selected data structure is empty; writing to the entry, if the entry is empty, the received data entity signature, and storing the received data entity in the storage system in response to a location of the entry in the set; selecting, if (a) the entry is not empty and (b) the received data entity signature differs from a stored data entity signature that is stored in the entry, a new data structure of the set, and repeating at least the stages of calculating and determining.. .
Infinidat Ltd.

Quick filename lookup using name hash

A method of updating a file record on at least one of a first one or more computer readable storage media including writing at least three contiguous directoryentry data structures corresponding to a directory entry set, the directory entry set corresponding to a file, the writing occurring to the at least one of a first one or more computer readable storage media.. .
Microsoft Licensing Technology, Llc

Hash based read and write operations in a storage system

A method for hash-based writing, the method comprises: receiving a received data entity to be stored in a storage system, wherein the received data entity is associated with received data entity metadata; selecting a selected data structure out of a set of data structures that comprises k data structures; wherein k is a positive integer; wherein for each value of a variable k that ranges between 2 and k, stored data entity metadata that is stored in a k'th data structure out of the set collided with stored data entity metadata that is stored in each one of a first till (k−1)'th data structures of the set; calculating an index by applying, on the received data entity metadata, a hash function that is associated with the selected data structure; determining whether an entry that is associated with the index and belongs to the selected data structure is empty; writing to the entry, if the entry is empty, the received data entity metadata, and storing the received data entity in the storage system in response to a location of the entry in the set; and selecting, if the entry is not empty, a new data structure of the set and repeating at least the stages of calculating and determining.. .
Infinidat Ltd.

Speculative finish of instruction execution in a processor core

In a processor core, high latency operations are tracked in entries of a data structure associated with an execution unit of the processor core. In the execution unit, execution of an instruction dependent on a high latency operation tracked by an entry of the data structure is speculatively finished prior to completion of the high latency operation.
International Business Machines Corporation

Instruction set architecture with opcode lookup using memory attribute

A method decodes instructions based in part on one or more decode-related attributes stored in a memory address translation data structure such as an effective to real translation (erat) or translation lookaside buffer (tlb). A memory address translation data structure may be accessed, for example, in connection with a decode of an instruction stored in a page of memory, such that one or more attributes associated with the page in the data structure may be used to control how that instruction is decoded..
International Business Machines Corporation

Methods for enforcing control flow of a computer program

One aspect of the invention provides a method of controlling execution of a computer program. The method comprises the following runtime steps: parsing code to identify one or more indirect branches; creating a branch id data structure that maps an indirect branch location to a branch id, which is the indirect branch's equivalence class id; creating a target id data structure that maps a code address to a target id, which is an equivalence class id to which the address belongs; and prior to execution of an indirect branch including a return instruction located at an address: obtaining the branch id associated with the return address from the branch id data structure; obtaining the target id associated with an actual return address for the indirect branch from the target id data structure; and comparing the branch id and the target id..
Lehigh University

Object storage and synchronization hooks for occasionally-connected devices

A system may include an application programming interface (api) layer, a cache layer, and an object storage/access layer. The api layer may expose an interface to store a business object and an interface to retrieve the business object, and may transmit a request to store the business object and a request to retrieve the business object, and the cache layer may cache the business object and transmit the request to store the business object and the request to retrieve the business object.
Sap Se

Hardware-enforced prevention of buffer overflow

An apparatus having processing circuitry configured to execute applications involving access to memory may include a cpu and a cache controller. The cpu may be configured to access cache memory for execution of an application.
The Johns Hopkins University

Business-to-business document user interface and integration design

Dynamic user interfaces for displaying and optionally modifying and/or overriding b2b parameter values in electronic b2b documents are generated based on the b2b standards, parameter names, and values defined for specific b2b electronic documents. An electronic document is selected and a document parameter data structure is accessed to identify associated document parameter values and application attributes.
Oracle International Corporation

Secured access to resources using a proxy

A method of authentication and accessing resources is provided. A client device may send a request to a proxy device to access a resource, such as an enterprise resource.
Citrix Systems, Inc.

Transmitter and receiver, and varying a coding rate

A data structure of a check matrix for the error correction code is a data structure of a check matrix for an error correction code, in which the error correction code is the ldpc code, and in which the check matrix has a matrix structure in which rows are rearranged for submatrices consisting of a part of columns of the check matrix. Moreover, in the method and device for varying the coding rate of the error correction code, a puncture position that is determined in accordance with a puncture position determination signal is a puncture position with which a number of columns in which two or more 1s are contained in a region of the check matrix that is directly affected by puncturing is minimized..
Mitsubishi Electric Corporation

Determining a threat level for one or more individuals

A system and computer-implemented method for determining a threat level for one or more individuals includes accessing a data structure to obtain aggregated data stored therein, wherein the aggregated data comprises at least one of communication history data or transaction history data for one or more individuals. One or more predetermined metrics are applied to the obtained aggregated data, to determine threat level information for the one or more individuals.
Intelmate Llc

System and scalable semantic stream processing

A system for collaborative analysis from different processes on different data sources. The system uses a unique approach to lightweight temporary data structures in order to allow communication of interim results among processes, and construction of semantically appropriate reports.
Sirius-beta Corp.

System and creating reusable geometry sequences for multiphysics modeling

A system generates a customized application data structure for modeling physical systems. The system includes a processor, an input device, optionally a display device, and a memory device.
Comsol Ab

Continuous collection of web api ecosystem data

An embodiment of the invention comprises a method associated with a web api ecosystem and api users includes identifying specified events over a period of time that respectively affect the ecosystem. Events can comprise an interaction between the ecosystem and a web api user or a specified web api.
International Business Machines Corporation

Use of collected data for web api ecosystem analytics

An embodiment of the invention pertains to web application programming interface (api) data associated with a web api ecosystem. The embodiment comprises constructing a data structure that is selectively related to at least some of the web api data associated with the web api ecosystem.
International Business Machines Corporation

Extracting and mining of quote data across multiple languages

Extracting and mining of quote data across multiple languages, including: retrieving, from a plurality of quote sources, a plurality of commentary summarizations, wherein each commentary summarization is embodied as a machine-readable data structure and wherein the plurality of commentary summarizations include information in at least two or more languages; for each commentary summarization: identifying, within the commentary summarization, quote data, wherein the quote data represents a quote from a commentator; creating a quote tuple for the quote data, the quote tuple including information associated with quantifiable aspects of the quote data; and storing, in a quote tuple repository, the quote tuple; mining, for quote analysis information, the quote tuple repository; and presenting, to a user, the quote analysis information.. .
International Business Machines Corporation

Systems, devices, and/or methods for managing data

Certain exemplary embodiments can provide a system, machine, device, manufacture, circuit, and/or user interface adapted for, and/or a method and/or machine-readable medium comprising machine-implementable instructions for, activities that can comprise: via a hierarchy processor implemented via a predetermined information device: for each of a plurality of records of a data structure, displaying data corresponding to a hierarchically displayable field according to a hierarchy location field containing a corresponding hierarchy location identifier indicative of a display location of that data in a displayable hierarchical data structure.. .

Method and system for processing queries over datasets stored using hierarchical data structures

Systems and methods for processing a query are provided. A method for processing a query of a tree-based dataset, comprises receiving the query, and analyzing the query and the dataset to create an execution plan for the query, wherein creating the execution plan comprises partitioning traversals over the dataset into sequential and parallel components, and distributing the components across a plurality of processing threads that independently traverse their portion of the dataset and compute local results.
International Business Machines Corporation

Data collection and cleaning at source

Apparatus and method to cleanse data, the apparatus including: a receiver to collect electronic data to cleanse; a processor coupled to the receiver, the processor configured to receive the data from the receiver; a memory coupled to the processor, the memory configured to store an application program; a first interface to an instantiation module, to process data collected by the receiver; and a second interface to a configuration manager module, the configuration manager module configured to control data structure and rules used by the instantiation module to process data, wherein the first interface and the second interface are callable from the application program to cleanse the data collected by the receiver.. .
Ims Health Incorporated

Managing document unit references to improve collaborative document editing

An approach is provided for managing a display of document unit references. Units of an original version of a document and original references to the units are stored in nodes of a data structure.
International Business Machines Corporation

Restoring data in a hierarchical storage management system

The present disclosure provides a hierarchical storage management system for storing data. A first controller receives a request to migrate a data item to a first storage tier.
International Business Machines Corporation

Data reuse tracking and memory allocation management

Exemplary methods, apparatuses, and systems receive a first request for a storage address at a first access time. Entries are added to first and second data structures.
Vmware, Inc.

Ledger-based resource tracking

Disclosed are systems, methods, and non-transitory computer-readable storage media for tracking and managing resource usage through a ledger feature that can trigger complex real-time reactions. The resource tracking can be managed through a ledger module and a ledger data structure.
Apple Inc.

Methods and systems for calculating statistical quantities in a computing environment

This disclosure is directed to methods and systems for calculating statistical quantities of computational resources used by distributed data sources in a computing environment. In one aspect, a master node receives a query regarding use of computational resources used by distributed data sources of a computing environment.
Vmware, Inc.

Complex constants

In an approach, a virtual machine identifies, within a set of instructions, an instruction to load a constant; identifies, based on the instruction to load the constant, a first entry in a data structure that identifies a particular constant type of the one or more constant types, wherein the first entry specifies at least constant data and a first set of instructions for assembling a value or partial value from the constant data; executes the first set of instructions to assemble the value or the partial value from the constant data; and stores a particular value or a reference to the particular value onto a run-time data structure used to pass values or references between sets of instructions executing in a run-time environment, wherein the particular value is based on the value or the particular value assembled from the constant data.. .
Oracle International Corporation

Method for changing gateway in machine-to-machine (m2m) system and device therefor

The present invention relates to a gateway changing method performed by a machine-to-machine (m2m) gateway which communicates with at least one m2m device having a constrained capability in an m2m system that includes a first layer and a second layer, and the a device therefor, the method comprising the steps of: receiving a trigger signal for indicating a gateway change through a first layer of the m2m gateway; and transmitting, to an m2m server, a first notification for indicating the gateway change through the first layer of the m2m gateway, wherein the m2m device having the constrained capability is a device that does not have the first layer, data generated in the second layer of the m2m device having the constrained capability is managed or stored in a data structure of a tree structure by the first layer of the m2m gateway, and the data structure that includes the data is retrieved by the m2m server after the notification has been transmitted to the m2m server.. .
Lg Electronics Inc.

Probe mechanism for discovering explicit congestion notification data

Explicit congestion notification (ecn) data that is utilized in a core portion of a cellular communication network has known issues associated with a first use scenario and an infrequent use scenario. A probe comprising probe data and a data structure for storing certain ecn data can be transmitted in order to mitigate these issues.
At&t Intellectual Property I, Lp

Firewall policy comparison

Systems, methods, and apparatuses for comparing firewall policies are described. In one aspect, a system includes a first gateway configured to implement a first firewall having a first policy, a second gateway configured to implement a second firewall having a second policy, and a computing device configured to compare the first policy with the second policy to determine whether the first policy matches the second policy.
Bank Of America Corporation

Workforce optimization by improved provision of job performance plan

A computer-implemented method provides a job performance plan for a plurality of jobs to be performed at geographical locations. The computer receives job data that represent job requirements for specified locations and processes the job data with the data-structure to provide an initial job performance plan.
Abb Technology Ag

Method and system for improving route assignment performance

A computer system for executing a method for improving route assignment performance. A route data structure is provided with a labeling algorithm.
Abb Technology Ag

Distributed dynamic detection of signatures from entity indicators

Autonomous computational processes (“agents”) representing application-specific domain entities are provided with application-independent methods and data structures to monitor one or more streams of behavioral indicator data observed in their respective entities and detect and report the presence of application-defined patterns of satisfied constraints (signatures) in real time. The invention specifies two agent populations, one (“host agents”) representing each domain entity with a dedicated agent that maintains current signature detection probabilities (and their constraint components), the other (“indicator agents”) continuously monitoring the behavioral indicator data and updating constraint satisfaction and signature detection probabilities..
Axon Al, Llc

Adaptation of a vector drawing based on a modified perspective

Techniques for modifying the appearance of objects comprising a two-dimensional vector drawing are disclosed. Such modifications can be made in response to user input that manipulates a viewing perspective for the drawing.
Adobe Systems Incorporated

Methods for enforcing control flow of a computer program

One aspect of the invention provides a method of controlling execution of a computer program. The method comprises the following runtime steps: parsing code to identify one or more indirect branches; creating a branch id data structure that maps an indirect branch location to a branch id, which is the indirect branch's equivalence class id; creating a target id data structure that maps a code address to a target id, which is an equivalence class id to which the address belongs; and prior to execution of an indirect branch including a return instruction located at an address: obtaining the branch id associated with the return address from the branch id data structure; obtaining the target id associated with an actual return address for the indirect branch from the target id data structure; and comparing the branch id and the target id..
Lehigh University

Context dependent application/event activation

The system includes a computer-readable memory having a data structure configured with electronic data indicative of the patient's cognitive ability and/or context information relevant to the patient. The computer system is programmed to dynamically present information based on the patient's cognitive ability and/or context, obtained by accessing the computer-readable memory.
Panasonic Corporation Of North America

Providing interaction between a first content set and a second content set in a computer system

Interaction is provided between a first content set and a second content set, both of which are loaded into a data structure. When an event associated with loading of the second content set is detected, the second content set is parsed to identify at least one sub-set of the second content set.
International Business Machines Corporation

Information management system

An information management system creates data structures based entirely on the content of source files, then compares these data structures to discover synergies and commonalities. In one embodiment, the system accepts a first collection of source files, and extracts text from each source file.
Perkinelmer Informatics, Inc.

Aggregation of interrupts using event queues

Embodiments of input/output hub unit are disclosed for aggregating interrupts received from multiple endpoint devices. The input/output hub may include an interface unit and one or more communication units.
Oracle International Corporation



Data Structure topics:
  • Data Structure
  • Data Structures
  • Granularity
  • Replication
  • Extensible Markup Language
  • Network Device
  • Wireless Client
  • Duplication
  • Loop Filter
  • Scheduling
  • Interpolation
  • Error Handling
  • Task Scheduling
  • Quantization
  • Video Decoding


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Data Structure for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Data Structure with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.4797

    file did exist - 3962

    1 - 1 - 79