1
Hisham Emad Elshishiny, Edel Greevy, Pai Fang Franny Hsiao, Alexey Nevidomskiy, Alexander Troussov, Pavel Volkov: Method and system for building and contracting a linguistic dictionary. International Business Machines Corporation, Cuenot Forsythe & Kim, January 3, 2012: US08090571 (84 worldwide citation)

A method for building and contracting a linguistic dictionary, the linguistic dictionary comprising a list of surface forms and a list of normalized forms, each normalized form being associated with a surface form, the method comprising the steps of: comparing each character of a surface form with e ...


2
Kirk J Krauss, Jonathan M Sanders: Runtime analysis of a computer program to identify improper memory accesses that cause further problems. International Business Machines Corporation, Cuenot Forsythe & Kim, October 16, 2012: US08291379 (38 worldwide citation)

Runtime analysis of a computer program can be performed. An improper memory access to a memory location can be detected during runtime of the computer program. A record of the improper memory access can be stored during runtime. A subsequent error condition in the computer program can be detected du ...


3
Matthew David Lavin: Method and apparatus for determining a service cluster topology based on static analysis. International Business Machines Corporation, Cuenot Forsythe & Kim, May 1, 2012: US08171473 (31 worldwide citation)

The service assignment tool analyzes a service to determine whether the service can execute on a cluster. If the service cannot execute on a cluster, the service is assigned to a single virtual machine. The service assignment tool identifies non-cluster friendly services by performing a static analy ...


4
Leigh Rothschild: Wireless image distribution system and method. SRR Patent Holdings, Cuenot Forsythe & Kim, June 19, 2012: US08204437 (17 worldwide citation)

A system and method for distributing at least one digital photographic image is presented, the system and method comprising at least one capturing device and at least one receiving device disposed in a communicative relation with one another via at least one wireless network. In particular, the capt ...


5
Christopher P Bergh, Michael S Bauer, Sidra Michon, Zack Miloushev, Kevin Furbish, Charles Evett, Gregory Erman, John Mandel: Offer delivery system. International Business Machines Corporation, Cuenot Forsythe & Kim, September 10, 2013: US08533038 (15 worldwide citation)

An offer delivery system provides a mechanism for coordinating presentation of offers to customers that may originate from multiple different sources and that may be delivered to the customers over different channels. The systems makes use of rules to prioritize, select, and time the delivery of off ...


6
Andrew Roberts: Capturing and processing change information in a web-type environment. International Business Machines Corporation, Cuenot Forsythe & Kim, February 22, 2011: US07895512 (15 worldwide citation)

A source markup language document and a modification to the source markup language document can be identified. One or more delta documents specifying the modification to the source markup language document can be created. The delta document can be independent of the source markup language document a ...


7
Richard Michael Bicheno, Kevin Anthony Braithwaite, Marc Stanley Carter, Tim Dunn, Michael George Taylor: Software testing method and system. International Business Machines Corporation, Cuenot Forsythe & Kim, November 8, 2011: US08056060 (15 worldwide citation)

A software product is tested by first obtaining a performance matrix for the software product, the performance matrix containing the profile results of a plurality of tests on the software product, and an expected result vector for the plurality of tests. A test sequence is then executed for the sof ...


8
Leigh M Rothschild: System and method for enabling social interactive wireless communications. Cuenot Forsythe & Kim, August 30, 2011: US08010131 (14 worldwide citation)

A computer-implemented system and method for enabling social interactive wireless communication between at least two mobile devices is presented. In particular, the system and method comprises affiliating and/or synchronizing a first mobile device and a second mobile device with an interactive socia ...


9
Samir Rajpal, Hariprasad Janardana Iyer, Douglas E Ross: Display management for communication devices with multiple displays. Motorola Mobility, Cuenot Forsythe & Kim, January 31, 2012: US08108782 (13 worldwide citation)

Within a communication device having a plurality of displays, a method of controlling the displays can include, responsive to receiving an event from an application within a display manager, determining whether a single event or multiple events are pending (430). If a single event is pending, the me ...


10
Tanuj Vohra: Use of memory watch points and a debugger to improve analysis of runtime memory access errors. International Business Machines Corporation, Cuenot Forsythe & Kim, August 10, 2010: US07774761 (13 worldwide citation)

A method of analyzing runtime memory access errors in a computer program can include instrumenting the computer program with runtime analysis code and detecting a runtime memory access error of the instrumented computer program. The method further can include, responsive to detecting the runtime mem ...