1
Lawrence A Clevenger, Louis Lu Chen Hsu, Jack A Mandelman, Carl J Radens: Self-trimming method on looped patterns. International Business Machines Corporation, Richard M Ludwin Esq, McGinn & Gibb PLLC, October 14, 2003: US06632741 (226 worldwide citation)

A method of self-trimming pattern, includes forming a pattern containing a plurality of regular or irregular features within a first material deposited on a substrate, depositing a conformal layer of second material, and etching the second material to form spacers of the second material along the si ...


2
Jong Deok Choi, Ravi Konuru, Harini Srinivasan: Method and system for recording and replaying the execution of distributed java programs. International Business Machines Corporation, Richard M Ludwin Esq, McGinn & Gibb PLLC, December 14, 2004: US06832367 (198 worldwide citation)

A method for recording and replaying execution of distributed programs on a computer system in a distributed environment, includes identifying an execution order of critical events of a program, generating groups of critical events of the program, wherein for each group, critical events belonging to ...


3
Birgit Hamp, Adrian Mueller, Frank Neumann, Annette Opalka, Roland Seiffert: Orthogonal browsing in object hierarchies. International Business Machines Corporation, Richard M Ludwin Esq, McGinn & Gibb PLLC, November 9, 2004: US06816175 (119 worldwide citation)

The present invention relates to means and a method executable by a computer system for navigation within a tree structure with leaf nodes representing arbitrary types of objects, i.e. of related data treated as a unit.


4
Asit Dan, Rajiv Ramaswami, Dinkar Sitaram: Support for portable trusted software. International Business Machines Corporation, Richard M Ludwin Esq, Heslin & Rothenberg P C, October 20, 1998: US05825877 (114 worldwide citation)

A form of authentication is provided wherein a trusted third party signs a certificate to identify the author of a program and to secure its integrity. The program code is encapsulated or otherwise associated with the certificate and an access control list (ACL). The access control list describes th ...


5
Matthew R Arnold, Stephen J Fink, David P Grove, Michael J Hind, Peter F Sweeney, John Whaley: Method for characterizing program execution by periodic call stack inspection. International Business Machines Corporation, Scully Scott Murphy & Presser, Richard M Ludwin Esq, February 15, 2005: US06857120 (89 worldwide citation)

A method for characterizing runtime behavior of a computer program executing in an execution environment comprising: generating a call stack runtime data structure for tracking methods currently active in an executing program thread, an active method on the call stack is represented by a frame; dete ...


6
Takayuki Okada: Processor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program. International Business Machines Corporation, Richard M Ludwin Esq, Scully Scott Murphy & Presser, March 9, 2004: US06704872 (68 worldwide citation)

The present invention provides an improved technology of preventing illegal use and execution of a software program provided to a computer system. More particularly, the present invention is directed to a Processor of a type in which a memory managing unit is installed therein to manage storing oper ...


7
German Goldszmidt, Jean A Lorrain, Kiyoshi Maruyama, Dinesh Chandra Verma: METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS, FOR MEETING SERVICE LEVEL AGREEMENTS (SLAS) WITH MINIMAL RESOURCES, AND ALLOWING COMMON POOLS OF RESOURCES TO BE USED ACROSS PLURAL CUSTOMERS ON A DEMAND BASIS. International Business Machines Corporation, Richard M Ludwin Esq, McGinn IP Law Group PLLC, May 30, 2006: US07054943 (64 worldwide citation)

A method (and system) for managing and controlling allocation and de-allocation of resources based on a guaranteed amount of resource and additional resources based on a best effort for a plurality of customers, includes dynamically allocating server resources for a plurality of customers, such that ...


8
Jeane Chen, Ephraim Feig, Liang Jie Zhang: Method and apparatus for integrating hyperlinks in video. International Business Machines Corporation, Richard M Ludwin Esq, McGinn & Gibb PLLC, June 28, 2005: US06912726 (47 worldwide citation)

Hypervideo data is encoded with two distinct portions, a first portion which contains the video data and a second portion, typically much smaller than the first, which contains hyperlink information associated with the video data. Preferably, the first and second portions are stored in separate and ...


9
Kiyoshi Maruyama: System and method for amicable small group multicast in a packet-switched network. International Business Machines Corporation, Richard M Ludwin Esq, McGinn & Gibb PLLC, June 29, 2004: US06757294 (44 worldwide citation)

A method (and system) of creating a multicast packet by a source node in a world-wide network, includes providing each multicast packet with a predetermined indicator indicating that the packet includes a multicast packet, one of a plurality of multicast destinations being placed in a packet destina ...


10
Richard Harold Boivie, Daniel Manuel Dias, Colin George Harrison, Eric M Levy Abegnoli, Jean A Lorrain, Kiyoshi Maruyama, Pascal Pol Marie Thubert: System and method for enforcing communications bandwidth based service level agreements to plurality of customers hosted on a clustered web server. International Business Machines Corporation, Richard M Ludwin Esq, McGinn & Gibb PLLC, January 11, 2005: US06842783 (43 worldwide citation)

A method and system for controlling and guaranteeing a service level agreement (SLA) based on a communications outbound link bandwidth usage to a plurality of customers having electronic business activity hosted by at least one server as a server farm, includes monitoring the outbound communications ...