1
Colin George Harrison, Dieter Jaepel: Wide-area wireless lan access. International Business Machines Corporation, Ronald L Drumheller, Jack M Arnold, August 18, 1998: US05796727 (451 worldwide citation)

A method and apparatus is provided which permits mobile computers equipped with modems for cellular telephone systems to obtain various classes of data communication services, as well as voice service, including taking part in local-area networks. The LAN's may be composed of conventional LANS in es ...


2
Kadathur S Natarajan, Chia Chi Huang: Battery efficient operation of scheduled access protocol. International Business Machines Corporation, Jack M Arnold, August 31, 1993: US05241542 (309 worldwide citation)

A method and apparatus for conserving battery power in a wireless link adapter of a battery operated computer such as a portable laptop computer, as controlled by a scheduled multiaccess protocol. The portable computer is operable as a mobile unit in a multi-cell wireless network. The scheduled acce ...


3
David F Bantz, Frederic J Bauchot, Chia Chi Huang, Nicholas J A Moulton: Diversity transmission strategy in mobile/indoor cellula radio communications. International Business Machines Corporation, Jack M Arnold, Louis J Percello, April 9, 1996: US05507035 (256 worldwide citation)

In a mobile cellular communication system, a base station is wired to a Local Area Network (LAN), and has wireless communication with a plurality of mobile stations. Multipath fading is substantially reduced in the system by utilizing antenna diversity techniques at the base station and each of the ...


4
Liam D Comerford, Steve R White: Hardware key-on-disk system for copy-protecting magnetic storage media. International Business Machines Corporation, Jack M Arnold, March 18, 1986: US04577289 (201 worldwide citation)

A copy-protection scheme is implemented for software which may be stored on a magnetic storage medium such as a disk. The medium is comprised of sections which are divided into subsections, with an original having indicia on at least one subsection of at least one section that is not modifiable by t ...


5
Akhileshwari N Chandra, Liam D Comerford, Steve R White: Implementing a shared higher level of privilege on personal computers for copy protection of software. International Business Machines Corporation, Jack M Arnold, February 17, 1987: US04644493 (188 worldwide citation)

Method and apparatus which restricts software, distributed on magnetic media, to use on a single computing machine. The original medium is functionally uncopyable, until it is modified by the execution of a program stored in a tamper proof co-processor which forms a part of the computing machine. Th ...


6
Clement Richard Attanasio, Laszlo Antal Belady: Operating system authenticator. International Business Machines Corporation, Jack M Arnold, December 7, 1976: US03996449 (172 worldwide citation)

An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification ...


7
John Cocke, Gregory F Grohoski, Vojin G Oklobdzija: Instruction control mechanism for a computing system with register renaming, map table and queues indicating available registers. International Business Machines Corporation, Jack M Arnold, February 12, 1991: US04992938 (165 worldwide citation)

A floating point instruction control mechanism which processes loads and stores in parallel with arithmetic instructions. This results from register renaming, which removes output dependencies in the instruction control mechanism and allows computations aliased to the same register to proceed in par ...


8
Michael Burstein, Se J Hong, Richard N Pelavin: Simultaneous placement and wiring for VLSI chips. International Business Machines Corporation, George E Clark, Jack M Arnold, Thomas P Dowd, June 3, 1986: US04593363 (142 worldwide citation)

For designing the layout of a master-slice VLSI chip steps for placing components and for determining the wiring pattern interconnecting them are alternated in an iterative process. The chip area is partitioned into subareas of decreasing size, the set of components is partitioned into subsets which ...


9
Robert P Fletcher, David M Stein, Irving Wladawsky Berger: Three level memory hierarchy using write and share flags. International Business Machines Corporation, Jack M Arnold, April 10, 1984: US04442487 (133 worldwide citation)

A multiprocessing three level memory hierarchy implementation is described which uses a "write" flag and a "share" flag per page of information stored in a level three main memory. These two flag bits are utilized to communicate from main memory at level three to private and shared caches at memory ...


10
Robert P Fletcher: Multiprocessing system including a shared cache. International Business Machines Corporation, Jack M Arnold, April 24, 1984: US04445174 (126 worldwide citation)

A control system for interlocking processors in a multiprocessing organization. Each processor has its own high speed store in buffer (SIB) cache and each processor shares a common cache with the other processors. The control system insures that all processors access the most up-to-date copy of memo ...