1
Jochen Doerre, Peter Gerstl, Sebastian Goeser, Adrian Mueller, Roland Seiffert: Taxonomy generation for document collections. International Business Machines Corporation, R Bruce Brodie, Marc D McSwain, September 3, 2002: US06446061 (321 worldwide citation)

This mechanism relates to a method within the area of information mining within a multitude of documents stored on computer systems. More particularly, this mechanism relates to a computerized method of generating a content taxonomy of a multitude of electronic documents. The technique proposed by t ...


2
Edgar W Swank: Method for communicating changes made to text form a text processor to a remote host. International Business Machines Corporation, Shelley M Beckstrand, R Bruce Brodie, Henry E Otto Jr, February 3, 1987: US04641274 (310 worldwide citation)

A method of editing at a processor text formed by lines of characters received by the processor from a remote source whereby communication between the processor and the remote source is minimized. The method steps at the text processor include (a) generating a respective checking number correspondin ...


3
Fernando A Luiz, Harlan C Snyder, John H Sorg Jr: Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access system. International Business Machines Corporation, R Bruce Brodie, June 10, 1980: US04207609 (275 worldwide citation)

A method and means for path independent reservation and reconnection of devices to CPU's operating in a multi-CPU and shared device access system environment. The multi-CPU and shared device access system comprises a plurality of sets of fan out paths (channels), each set coupling a corresponding CP ...


4
Robert P Lee, Felix H Closs: Method and means for demand accessing and broadcast transmission among ports in a distributed star network. International Business Machines Corporation, R Bruce Brodie, August 31, 1982: US04347498 (253 worldwide citation)

A demand access broadcast transmission method and means is capable of supporting random port access and any-to-any transmission at very high data rates. A communication medium (FIG. 2) formed from an inverted tree network of nodes (1, 18, 22) and full duplex connecting links (13, 17, 19) permits the ...


5
Everett Truman Eiselen: Apparatus for image manipulation. International Business Machines Corporation, R Bruce Brodie, August 24, 1976: US03976982 (218 worldwide citation)

An image can be represented by an M .times. N array I(*,*) of image points, where each point I(i,j) over the ranges 0.ltoreq.i


6
James J Myers, Pong Sheng Wang: CPU implemented method for backing up modified data sets in non-volatile store for recovery in the event of CPU failure. International Business Machines Corporation, R Bruce Brodie, September 26, 1995: US05454099 (199 worldwide citation)

A CPU implemented method for managing the backup copying of data sets residing in non-volatile storage and for the recovery thereof in the event of CPU failure. The first step is to invoke a modified incremental backup copy policy using a small backup window and less data than that heretofore used i ...


7
Dieter Gawlick, James N Gray, Wallace M Iimura, Ronald L Obermarck: Method and apparatus for logging journal data using a log write ahead data set. International Business Machines Corporation, Shelley M Beckstrand, R Bruce Brodie, March 26, 1985: US04507751 (161 worldwide citation)

The invention provides a computing apparatus and method for maintaining a journal log. The computing apparatus includes volatile storage for storing a log buffer and a non-volatile storage for storing a journal log. Non-volatile storage means are provided for storing in a write-ahead data set a plur ...


8
Kenneth M Kapulka, Holly A Rader, Jimmy P Strickland: Method for managing reuse of hard log space by mapping log data during state changes and discarding the log data. International Business Machines Corporation, R Bruce Brodie, Pryor A Garnett, October 31, 1989: US04878167 (150 worldwide citation)

A method for writing tagged (partitioned and classified) records from a first log stream to multiple recovery streams and discarding same from said first stream at the termination of the unit of recovery in a transaction-oriented system to permit first log stream reuse.


9
Joann Ruvolo: Method and means for preventing unauthorized resumption of suspended authenticated internet sessions using locking and trapping measures. International Business Machines Corporation, R Bruce Brodie, July 27, 1999: US05928363 (143 worldwide citation)

A method in which unauthorized persons can be excluded from accessing an HTTP-compliant, server-based application through a client processor when the session is suspended. The method requires that authenticated access is initially bound to the application and client reauthentication by the applicati ...


10
Walter E Bass, Stephen M Matyas, Jonathan Oseas: Method for establishing user authenication with composite session keys among cryptographically communicating nodes. International Business Machines Corporation, R Bruce Brodie, F D LaRiviere, March 10, 1987: US04649233 (130 worldwide citation)

A method for authenticating nodes/users and in protecting data flow between nodes. This is facilitated by creating a dialogue involving authenticated encryption among the nodes. During each session, a key for use in cryptographic conversion is constructed among the node participants in order to perm ...