1
David C Baker, Kathryn A Bohrer, Gregory A Flurry: Display terminal with a cursor responsive virtual distributed menu. International Business Machines Corporation, J B Kraft, April 29, 1986: US04586035 (114 worldwide citation)

An interactive display terminal of the multiple overlapping window type is provided. Each of the windows is smaller in dimension than the overall display screen. One or more of the windows have an associated virtual distributed menu which is made up of a plurality of menu items respectively distribu ...


2
Kathryn A Bohrer, Catherine A Chess, Robert L Hoch, John Karat, Dogan Kesdogan, Xuan Liu, Edith G Schonberg, Moninder Singh: System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network. International Business Machines Corporation, F Chau & Associates, January 13, 2009: US07478157 (82 worldwide citation)

An exemplary embodiment of the present invention includes a method to enforce privacy preferences on exchanges of personal data of a data-subject. The method comprises the steps of: specifying data-subject authorization rule sets having subject constraints, receiving a request message from a request ...


3
David C Baker, Kathryn A Bohrer, Gregory A Flurry, Peter Lucas, James R Rhyne: System concurrently running application programs and selectively routing device input to resource controller created virtual terminals and real physical devices. International Business Machines Corporation, Wayne P Bailey, Marilyn D Smith, April 28, 1992: US05109510 (34 worldwide citation)

A method of, and apparatus for, running several applications concurrently on a processing system. Virtual terminals are created for running the applications. However, the virtual terminals perform as though the processing system were a single terminal system. In this way, any application written for ...


4
David C Baker, Kathryn A Bohrer, Greogory A Flurry, Peter Lucas, James R Rhyne: Method and apparatus for substituting real and virtual devices independent from an data processing system application program. International Business Machines Corporation, Marilyn D Smith, Wayne P Bailey, Mark E McBurney, August 9, 1994: US05337412 (30 worldwide citation)

A method of, and apparatus for, running several applications concurrently on a processing system. Virtual terminals are created for running the applications. However, the virtual terminals perform as though the processing system were a single terminal system. In this way, any application written for ...


5
Kathryn A Bohrer, Michael D McKeehan, Andre Tost, Erik E Voldal: Object-oriented apparatus and method for controlling configuration of object creation. International Business Machines Corporation, Derek P Martin, Martin & Associates, August 24, 1999: US05943497 (25 worldwide citation)

An object-oriented mechanism is disclosed that allows new configuration data to replace existing configuration data within an existing object-oriented program. The new configuration data allows an OO program to be quickly and easily generated from an existing OO program without manually changing the ...


6
Kathryn A Bohrer, Albert D Edgar: Font compression and decompression for character generation. International Business Machines Corporation, Douglas H Lefeve, November 6, 1984: US04481602 (14 worldwide citation)

In a technique for storing data representative of characters and symbols of a font in a compacted manner, interstitial bank spaces between characters are removed. The proper symbol is addressed during decompression by combining a calculated approximate pointer with a limited range correction factor ...


7
Kathryn A Bohrer, Catherine A Chess, Robert L Hoch, John Karat, Dogan Kesdogan, Xuan Liu, Edith G Schonberg, Moninder Singh: System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network. International Business Machines Corporation, Louis J Percello, Intellectual Property Law Dept, May 8, 2003: US20030088520-A1

A system, method, and business method is used to enforce privacy preferences on exchanges of personal data over a computer network. There are one or more data-subject (subject) rule sets that have one or more subject constraints on one or more private, subject data releases. A receiving process rece ...