1
Alan D Michel, Robert E Reinke: Software pay per use system. Lucent Technologies, Jeffrey M Weinick, Donald P Dinella, April 29, 1997: US05625690 (225 worldwide citation)

A pay per use system for of the unauthorized use of computer software. An encryption program encodes original software to produce secured software. The encoding is accomplished by using cryptographic techniques. In order to use the software, a user must call a telephone number to receive the cryptog ...


2
Alan Denis MacDonald: Method and apparatus for determining the location of a mobile telephone. AT&T Wireless Services, Jeffrey M Weinick, March 24, 1998: US05732354 (191 worldwide citation)

A method and apparatus for determining the location of a mobile telephone within the serving area of a mobile telephone system are disclosed. A mobile switching center analyzes the calling mobile telephone number and called telephone number to determine if a location function is required. Upon initi ...


3
Lee Fang Wei: Turbo code symbol interleaver. Lucent Technologies, Ronald D Slusky, Jeffrey M Weinick, John F McCabe, February 26, 2002: US06351832 (170 worldwide citation)

Advantageous error rate performance, high bandwidth efficiency, low delay and reduced error floor are achieved at an acceptable level of decoding complexity via the use of serial concatenated turbo codes. These are codes for which at least some of the output bits, including at least one redundant bi ...


4
Lee Fang Wei: Turbo code termination. Lucent Technologies, Jeffrey M Weinick, July 24, 2001: US06266795 (168 worldwide citation)

Advantageous error rate performance, high bandwidth efficiency, low delay and reduced error floor are achieved at an acceptable level of decoding complexity via the use of serial concatenated turbo codes. These are codes for which at least some of the output bits, including at least one redundant bi ...


5
Kenneth W Church, William A Gale, David E Yarowsky: Word disambiguation apparatus and methods. AT&T, Gordon E Nelson, Jeffrey M Weinick, July 30, 1996: US05541836 (133 worldwide citation)

Apparatus and methods for determining whether a word/sense pair is proper for a context. Wide contexts (100 words) are employed for both training and testing, and testing is done by adding the weights of vocabulary words from the context. The weights are determined by Bayesian techniques which inter ...


6
Timothy G Griffin, Richard Baxter Hull, Bharat Kumar, Daniel Francis Lieuwen, Gang Zhou: Data architecture for fetch-intensive database applications. Lucent Technologies, Geraldine D Monteleone, Jeffrey M Weinick, December 21, 1999: US06006216 (124 worldwide citation)

A logical data architecture for fetch-intensive database applications includes a first and a second logical database. The second database includes materialized views over the first database. Updates are propagated from the first database to the second database using so-called view maintenance techni ...


7
Yennun Huang: Apparatus and method for fault-tolerant computing. Lucent Technologies, Donald P Dinella, Jeffrey M Weinick, Gordon E Nelson, May 5, 1998: US05748882 (102 worldwide citation)

Techniques for fault-tolerant computing which do not require fault-tolerant hardware or a fault-tolerant operating system. The techniques employ a monitor daemon which is implemented as one or more user processes and a fault-tolerant library which can be bound into application programs. A user proce ...


8
Yi Min Wang: Method for software error recovery using consistent global checkpoints. Lucent Technologies, Jeffrey M Weinick, Donald P Dinella, May 13, 1997: US05630047 (85 worldwide citation)

Disclosed is a method for error recovery in a multiprocessing computer system of the type in which each of the processes periodically takes checkpoints. In the event of a failure, a process can be rolled back to a prior checkpoint, and execution can continue from the checkpointed state. A monitor pr ...


9
N Dudley Fulton III, Yennun Huang, Chandra Mohan Rao Kintala, Nicholas John Kolettis: Apparatus and methods for software rejuvenation. Lucent Technologies, Donald P Dinella, Jeffrey M Weinick, Gordon E Nelson, February 3, 1998: US05715386 (59 worldwide citation)

Software rejuvenation techniques which improve reliability of a software system by stopping execution of the system and restarting the execution with "clean" state. The rejuvenation techniques are generally available to applications executing in a computer system. The techniques are implemented usin ...


10
Lee Fang Wei: Probabilistic trellis coded modulation with PCM-derived constellations. Lucent Technologies, Ronald D Slusky, Jeffrey M Weinick, September 14, 1999: US05953376 (51 worldwide citation)

Signal points from a PCM-derived constellation are selected for transmission via a modulation technique which employs different levels of redundancy coding--including the possibility of no redundancy coding--for respective different sub-constellations of the overall PCM-derived constellation. The co ...



Click the thumbnails below to visualize the patent trend.