1
Stefan Letz, Kai Weber, Juergen Vielfort: Verifying a processor design using a processor simulation model. International Business Machines Corporation, The Steadman Law Firm PLLC, Cynthia seal, August 21, 2012: US08249848 (3 worldwide citation)

An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each executi ...


2
Ross Bevan Engers, Stefan Letz: Disk replacement using a predictive statistical model. Amazon Technologies, Baker & Hostetler, January 10, 2017: US09542296 (2 worldwide citation)

In a provider network, attributes of one of a plurality of storage devices of the provider network are identified for failure monitoring. Based on a failure prediction model, a predicted probability of failure of the selected storage device is determined. The failure prediction model is based on his ...


3
Stefan Letz, Kai Weber, Juergen Vielfort: Verifying a processor design using a processor simulation model. International Business Machines Corporation, The Steadman Law Firm PLLC, Cynthia G Seal, Katherine S Brown, December 3, 2013: US08600724 (2 worldwide citation)

An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each executi ...


4
Oliver Augenstein, Stefan Letz: User device, computer program product and computer system for system for secure network storage. International Business Machines Corporation, Yee & Associates P C, Jeffrey S LaBaw, September 3, 2013: US08527749 (1 worldwide citation)

A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising a volume mapping schema and a connection mapping schema, and a driver operable to map I/O requests for logical data blocks to one or multipl ...


5
Oliver Augenstein, Stefan Letz: Restoration of data from a backup storage volume. International Business Machines Corporation, Thomas E Lees, April 14, 2015: US09009430 (1 worldwide citation)

A method is provided for restoring data from a backup storage volume onto a source storage volume. A content of a memory unit of the backup storage volume and a content of the corresponding memory unit of the source storage volume are loaded into a computer memory, and are compared in the computer m ...


6
Stefan Letz, Juergen Vielfort, Kai Weber: Test case generation with backward propagation of predefined results and operand dependencies. International Business Machines Corporation, Randall Bluestone Esq, January 4, 2011: US07865793 (1 worldwide citation)

A method of generating a test case from a given test case structure, the method including generating instructions for the given test case structure, propagating predefined results in a backwards manner, randomly generating remaining operands of the test case structure in a forwards manner, and calcu ...


7
Stefan Letz, Roland Seiffert: Method and data processing system for providing XML data. International Business Machines Corporation, Dennis Jung, August 16, 2011: US08001212 (1 worldwide citation)

A method and systems for providing XML data is disclosed. In accordance with an embodiment of the invention, a second data processing system, which is connected to a first data processing system via a network, receives a first request over the network from the first data processing system. The first ...


8
Oliver Augenstein, Stefan Letz: Deduplication of encrypted data. International Business Machines Corporation, Francis Lammes, Stephen J Walder Jr, Jeffrey S LaBaw, January 6, 2015: US08930686 (1 worldwide citation)

A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) ...


9
Walter Haug, Steffen Hees, Roland Seiffert, Stefan Letz, Jan Bernd Themann: Automatic creation, deployment, and upgrade of disk images. GLOBAL FOUNDRIES, DeLio Peterson & Curcio, Kelly M Nowak, September 20, 2016: US09448807

A computer installs an operating system. The computer receives, in a logical partition (LPAR) via a management network, a deploy program configured to download a disk image from an image repository and to write the disk image to a first direct access storage device (DASD) of the LPAR. The disk image ...


10
Stefan Letz, Michelangelo Masini, Juergen Vielfort, Kai Weber: Verifying a register-transfer level design of an execution unit. International Business Machines Corporation, Francis Lammes, Stephen J Walder Jr, Libby Z Toub, March 19, 2013: US08402403

A mechanism is provided for verifying a register-transfer level design of an execution unit. A set of instruction records associated with a test case are generated and stored in a buffer. For each instruction record in the set of instruction records associated with the test case: the instruction rec ...