1
Thomas P Bishop, Mark H Davis, David N Horn, Grover T Surratt, Lawrence A Welsch: Inter-processor communication protocol. American Telephone and Telegraph Company, David Volejnicek, April 3, 1990: US04914653 (87 worldwide citation)

Processors (101) of a multiprocessor system (FIG. 1) communicate across bus (150) via a low-latency packet protocol featuring per-logical channel input queues (143) and output queues (144), different per-processor priorities for sending data packets (FIG. 10) and data packet-acknowledging "quick" me ...


2
Thomas P Bishop, Mark H Davis, Grover T Surratt: Extended process for a multiprocessor system. American Telephone and Telegraph Company, AT&T Information Systems, John C Moran, February 13, 1990: US04901231 (61 worldwide citation)

In a multiprocessor system, a program's execution that is controlled by controlling an extended process that spans a plurality of processors. The extended process comprises an user process on one processor for executing object code of the program and stub processes each on an individual one of said ...


3
Thomas P Bishop, Mark H Davis, Robert W Fish, James S Peterson, Grover T Surratt: Multiprocessor memory management method. American Telephone and Telegraph Company, AT&T Information Systems, David Volejnicek, March 7, 1989: US04811216 (42 worldwide citation)

In a multiprocessor system (FIG. 1), memory (22) of each adjunct processor (11-12) comprises global memory (42) and local memory (41). All global memory is managed by a process manager (30) of host processor (10). Each processor's local memory is managed by its operating system kernel (31). Local me ...


4
Thomas P Bishop, Mark H Davis, James S Peterson, Grover T Surratt: Controlled dynamic load balancing for a multiprocessor system. AT&T Bell Laboratories, John C Moran, May 19, 1992: US05115505 (39 worldwide citation)

A method for allowing a system administrator, application programmer, and/or program user to adjust the processor assignment function in a multiprocessor system. The system administrator controls the assignment function by defining certain system variables and flags. The application programmer can a ...


5
Thomas P Bishop, Mark H Davis, Robert W Fish, James S Peterson, Grover T Surratt: Multiprocessor memory management system with the flexible features of a tightly-coupled system in a non-shared memory system. AT&T Laboratories, David Volejnicek, March 3, 1992: US05093913 (37 worldwide citation)

In a multiprocessor system (FIG. 1) wherein each adjunct processor has its own, non-shared, memory (22) the non-shared memory of each adjunct processor (11-12) comprises global memory (42) and local memory (41). All global memory of all adjunct processors is managed by a single process manager (30) ...


6
Mark H Davis, Richard A Meador, Macmillan M Wisler: Electrical resistivity measurement of a flowing drilling fluid using eddy currents generated therein. NL, Browning Bushman Zamecki & Anderson, August 20, 1985: US04536713 (15 worldwide citation)

A high permeability ferrite core, which includes a gap between adjacent ends thereof, is combined with a magnetic coil encircling the core, and is located in a sub positioned in the drill string just above the drill bit of a borehole drilling rig. The core is positioned so that the gap thereof lies ...


7
Mark H Davis, Alexander S Lukichev: Tokenization using multiple reversible transformations. Intel Corporation, Barnes & Thornburg, September 6, 2016: US09436839 (1 worldwide citation)

Technologies for tokenizing data including a computing device to extract plaintext data from an input file to be tokenized. The computing device performs data domain-specific format-preserving encryption on the extracted plaintext data based on a first cryptographic key to generate encrypted data an ...


8
Mark H Davis, Alexander S Lukichev: Tokenization using multiple reversible transformations. Intel Corporation, Barnes & Thornburg, August 15, 2017: US09736142

Technologies for tokenizing data including a computing device to extract plaintext data from an input file to be tokenized. The computing device performs data domain-specific format-preserving encryption on the extracted plaintext data based on a first cryptographic key to generate encrypted data an ...