1
James Kraemer Ph.D.
Christine A Banke, William S Carter, Pawan Khera, James R Kraemer, Elizabeth V Woodward: Adaptation of vocabulary levels for enhanced collaboration. International Business Machines Corporation, Francis Lammes, Stephen J Walder Jr, Libby Z Toub, May 27, 2014: US08738364

A mechanism is provided for adapting vocabulary levels in a collaborative session. A vocabulary level indicator is received for a first user in the collaborative session. During generation of an electronic communication by a second user in the collaborative session, text entered in the electronic co ...


2
Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng Han Shieh: Rogue router hunter. International Business Machines Corporation, Yee & Associates P C, Libby Z Toub, August 2, 2011: US07991877 (142 worldwide citation)

A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises ...


3
Rajiv V Joshi, Rouwaida N Kanj, Sani R Nassif: Methodology for correlated memory fail estimations. International Business Machines Corporation, Garg Law Firm PLLC, Rakesh Garg, Libby Z Toub, July 3, 2012: US08214190 (86 worldwide citation)

Correlated failure distribution for memory arrays having different groupings of memory cells is estimated by constructing memory unit models for the groupings based on multiple parameters, establishing failure conditions of the memory unit model using fast statistical analysis, calculating a fail bo ...


4
Kanak B Agarwal, Shayak Banerjee, Praveen Elakkumanan, Lars W Liebmann: Electrically-driven optical proximity correction to compensate for non-optical effects. International Business Machines Corporation, Libby Z Toub, Jack V Musgrove, January 24, 2012: US08103983 (82 worldwide citation)

A contour of a mask design for an integrated circuit is modified to compensate for systematic variations arising from non-optical effects such as stress, well proximity, rapid thermal anneal, or spacer thickness. Electrical characteristics of a simulated integrated circuit chip fabricated using the ...


5
Michael Wayne Brown, Rabindranath Dutta, Michael A Paolini, Newton James Smith Jr: Credit authorization system and method. International Business Machines Corporation, Yee & Associates P C, Libby Z Toub, July 6, 2010: US07752135 (55 worldwide citation)

A system and method for preventing credit card fraud by comparing the location of a given transaction with the location of a predetermined communication device is provided.


6
Willam Kress Bodin, Derral C Thorson: On-demand supplemental diagnostic and service resource planning for mobile systems. International Business Machines Corporation, Robert H Frantz, Libby Z Toub, September 27, 2011: US08027843 (52 worldwide citation)

Enhanced diagnostic service is provided by determining availability of and downloading a supplemental diagnostic function to isolate a failure according to a service signal from a mobile system; coalescing offers for a repair service according to results of the execution of the downloaded diagnostic ...


7
Nitin P Gupta, Madhavan Srinivasan: Virtual memory management. International Business Machines Corporation, Garg Law Firm PLLC, Rakesh Garg, Libby Z Toub, April 19, 2011: US07930515 (51 worldwide citation)

A method for managing a virtual memory system configured to allow multiple page sizes is described. Each page size has at least one table associated with it. The method involves maintaining entries in the tables to keep track of the page size for which the effective address is mapped. When a new eff ...


8
Travis M Grigsby, Margaret Beth Morgan, Lisa Anne Seacat, David Warren Zysk: Protect sensitive content for human-only consumption. International Business Machines Corporation, Yee & Associates P C, Libby Z Toub, January 1, 2013: US08347396 (33 worldwide citation)

A computer implemented method, apparatus, and computer usable program product for protecting sensitive content. In response to receiving a selection of content, the process determines whether the content is of a sensitive content type based on a policy. The process then designates the content as the ...


9
William K Bodin, David Jaramillo, Jesse W Redman, Derral C Thorson: Providing disparate content as a playlist of media files. International Business Machines Corporation, Edward J Lenart, Libby Z Toub, Biggers & Ohanian, August 17, 2010: US07778980 (29 worldwide citation)

Methods, systems, and computer program products are provided for providing disparate content as a playlist of media files for rendering on a portable media player. Embodiments include aggregating content of disparate data formats from disparate data sources, wherein the aggregated content is in a da ...


10
Nia L Kelley, Guillermo J Silva: Methods and apparatuses for remote control of vehicle devices and vehicle lock-out notification. International Business Machines Corporation, Stephen J Walder Jr, Libby Z Toub, June 14, 2011: US07961076 (29 worldwide citation)

Methods, systems, and media for remote control of a vehicle device and vehicle lockout notification are disclosed. Embodiments comprise a method of creating a secure bidirectional communication link between a remote access device and a central locking unit (CLU) of a vehicle, enabling the central lo ...