1
Clinton L Ballard, Timothy W Smith: Accelerating access to wide area network information in mode for showing document then verifying validity. Acceleration Software International Corporation, Steven P Koda Esq, December 5, 2000: US06157930 (41 worldwide citation)

WAN documents are stored locally in cache with a document expiration date. Ideally, content is unchanged prior to the expiration date and has changed after the expiration date. When requesting to view a WAN document while on-line, the document first is displayed from cache for display and verify mod ...


2
Clinton L Ballard, Timothy W Smith: Heuristic method for preloading cache to enhance hit rate. Acceleration Software International Corporation, Steven P Koda, March 28, 2000: US06044439 (40 worldwide citation)

Computer system activity is monitored to identify triggers. A trigger is an event or sequence of events which is a reliable predictor of the subsequent occurrence of a specific repeated disk-intensive interval. A disk-intensive interval is an interval of time in which disk read and/or disk write ope ...


3
Clinton L Ballard, Timothy W Smith: System for estimating access time by deriving from first and second rotational time from rotational time table based on logical address and head movement time. Acceleration Software International Corporation, Steven P Koda, December 29, 1998: US05854941 (32 worldwide citation)

Disk I/O average access time is improved by estimating access time for pending I/O requests and selecting the request with the lowest estimated access time as the next request to be processed. To provide fast run-time estimation, disk characteristics are derived off-line and stored in files/tables f ...


4
Timothy W Smith, Melvin E Scott, Fred D Boyd: Self-aligning battery changing system for electric battery-powered vehicles. Long Airdox Company, Piper Marbury Rudnick & Wolfe, September 5, 2000: US06113342 (13 worldwide citation)

A battery and battery lifting system for a mining or construction vehicle, the vehicle having a frame, the system having a battery, the battery having at least one slot, the at least one slot having vertical sidewalls which extend toward convergence, and at least one wedge-shaped arm for lifting the ...


5
Clinton L Ballard, Timothy W Smith: Program launch acceleration using ram cache. Acceleration Software International Corporation, Steven P Koda, August 3, 1999: US05933630 (11 worldwide citation)

Launch time for a computer program is reduced by logging hard disk accesses during an initial launch, then processing the log file to accelerate subsequent launches. The log file is processed by identifying all the file portions accessed during the launch, eliminating any duplicate cluster accesses, ...


6
Clinton L Ballard, Timothy W Smith, Todd Rogers: Program lunch acceleration. Acceleration Software International Corporation, Steven P Koda, January 5, 1999: US05857101 (6 worldwide citation)

A computer program's launch time is reduced by reorganizing physical address storage of the program on a secondary storage device. Launch of the program is detected, then file access during the launch is monitored. A log file entry is created for each access to the secondary storage device. After la ...


7
Timothy W Smith: Cartridge dispenser extension and extrusion system. Donn K Harms, November 16, 2004: US06817492 (6 worldwide citation)

A dispensing device adapted for operative attachment to flanged cartridges containing viscous material. The device features an elongated support tube having a laterally translatable rod assembly therein which translates through rotation of the rod assembly to disperse material from an attached cartr ...


8
Clinton L Ballard, Joshua N Lizon, Christopher D Ayers, Daniel K Horn, Ricardo L Spates, Jon G Delmendo, Joseph P Sines, Andrew E Olsen, Timothy W Smith: Message handling with format translation and key management. Koda Law Office, April 3, 2003: US20030065941-A1

A subscribing user generates a private key and a corresponding public key stored locally in a “key-ring.” The public key is uploaded to a key repository on a communications server, where public keys of subscribers are maintained. When sending a secure message, the sender's key-ring is checked to det ...