AUTOMATIC LOCATION OF ADDRESS INFORMATION ON PARCELS SENT BY MASS MAILERS
    174.
    发明公开
    AUTOMATIC LOCATION OF ADDRESS INFORMATION ON PARCELS SENT BY MASS MAILERS 有权
    AUTOMATISCHE AUFFINDUNG VON ADRESSENINFORMATIONEN AUF VON MASSENSENDERN GESENDETEN PAKETEN

    公开(公告)号:EP1287480A4

    公开(公告)日:2007-02-28

    申请号:EP01908087

    申请日:2001-02-25

    Applicant: IBM

    CPC classification number: G06K9/2054 G06K2209/01

    Abstract: A method for automatic sorting includes receiving an item (22) in a sequence of items to be sorted, each such item marked with a respective machine-readable identifying code (42, 52, 54) and with respective characters (44, 56) in a location relative to the code that varies from one item to another in the sequence. A position of the code on the item is determined and, responsive to the position of the code, the location of the characters on the item is found. The characters are processed to determine a destination of the item.

    Abstract translation: 一种用于自动分拣的方法包括接收要被分拣的物品序列中的物品(22),每个这样的物品用相应的机器可读识别码(42,52,54)标记并且以相应的字符(44,56)标记在 一个相对于代码的位置,该顺序随着一个项目而变化。 确定物品上代码的位置,并且响应代码的位置,找到物品上的人物的位置。 处理字符以确定物品的目的地。

    FULL CACHE COHERENCY ACROSS MULTIPLE RAID CONTROLLERS
    176.
    发明公开
    FULL CACHE COHERENCY ACROSS MULTIPLE RAID CONTROLLERS 审中-公开
    FULL缓存的一致性之间VERSHIEDENEN RAID控制器

    公开(公告)号:EP1163586A4

    公开(公告)日:2007-01-10

    申请号:EP00905733

    申请日:2000-01-25

    Applicant: IBM

    Inventor: HUBIS WALTER A

    Abstract: A method for providing cache coherency in a RAID system (100) in which multiple RAID controllers (104) provide read/write access to shared storage devices (108) for multiple host computers (102). Each controller includes read (114), write (116) and write mirror (118) caches and the controllers and the shared storage devices are coupled to one another via common backend buses (110). Whenever a controller receives a write command (302) from a host the controller writes the data to the shared devices, its write cache and the write mirror caches of the other controllers. Whenever a controller receives a read command (320) from a host the controller attempts to return the requested data from its write mirror cache, write cache and read cache and the storage devices, in that order.

    NESTABLE READER-WRITER LOCK FOR MULTIPROCESSOR SYSTEMS
    177.
    发明公开
    NESTABLE READER-WRITER LOCK FOR MULTIPROCESSOR SYSTEMS 审中-公开
    对于多处理器系统嵌套READER / SCHREIBERLOCK

    公开(公告)号:EP1247170A4

    公开(公告)日:2006-12-13

    申请号:EP01903009

    申请日:2001-01-09

    Applicant: IBM

    CPC classification number: G06F9/52

    Abstract: A nestable reader-writer lock minimizes writer and reader overhead by employing lock structures that are shared among groups of processors (24) that have lower latencies. In the illustrated multiprocessor system having a non-uniform memory access (NUMA) architecture, in a first embodiment each processor node has a lock structure (83) comprised of a shared counter (84) and associated flag (85) for each CPU group. During a read, the counter can be changed only by processors within a CPU group performing a read. This reduces the reader overhead that otherwise would exist if all processors in the system sharEd a single counter. During a write, the shared flag can be changed by a process running on any processor in the system. The processors in a CPU group are notified of the write through the shared flag. This reduces the writer overhead that otherwise would exist if each processor in the system had a separate flag. The number of CPUs per group can be varied to optimize performance of the lock in different multiprocessor systems. In a second embodiment a global counter (91) indicates the number of active reader threads that are not accounted for in the per-CPU-group counters (94). This permits a reader thread to read-release a lock without determining which processor that thread was running on when it last read-acquired that lock.

    METHOD OF INVISIBLY EMBEDDING AND HIDING DATA INTO SOFT-COPY TEXT DOCUMENTS
    179.
    发明授权
    METHOD OF INVISIBLY EMBEDDING AND HIDING DATA INTO SOFT-COPY TEXT DOCUMENTS 有权
    法在软拷贝文本文档隐形嵌入和隐藏数据的

    公开(公告)号:EP1410619B1

    公开(公告)日:2006-10-25

    申请号:EP02732722.0

    申请日:2002-04-25

    Abstract: Method of invisibly embedding and hiding data into a text document by modifying selected invisible attributes of invisible characters on a plurality of inter-word intervals, comprising the steps of selecting (10) at least one attribute that is invisible on the space characters used as inter-word intervals, transforming (14) the document into a canonical form by setting on all inter-word intervals the values of the selected attribute to the same default value, encoding (18) the data to be embedded and hidden into the document as an ordered set of values corresponding to the different values of the selected attribute, selecting (20) a set of inter-word intervals among all inter-word intervals corresponding to a set of space characters, and replacing (22) on each space character of this set of space characters, default attribute values by the corresponding encoded data.

    METHOD AND SYSTEM FOR A GRID-ENABLED VIRTUAL MACHINE WITH MOVABLE OBJECTS
    180.
    发明公开
    METHOD AND SYSTEM FOR A GRID-ENABLED VIRTUAL MACHINE WITH MOVABLE OBJECTS 审中-公开
    对于方法和装置GRID-启用了虚拟机运动物体

    公开(公告)号:EP1706819A1

    公开(公告)日:2006-10-04

    申请号:EP04821179.1

    申请日:2004-10-26

    CPC classification number: G06F9/5088 G06F9/4856 G06F9/5072 Y10S707/99956

    Abstract: A method, an apparatus, a computer program product, and a data processing system provide for operation of a virtual machine with embedded functionality for interoperating with other virtual machines in a computational grid. A plurality of virtual machines are run on one or more devices within a data processing system; each virtual machine in the plurality of virtual machines incorporates functionality for interoperating and associating with other virtual machines in a virtual machine cluster in a grid-like manner. Each virtual machine in the virtual machine cluster acts as a node within the virtual machine cluster. A virtual machine manages its objects in association with an object group, and each virtual machine may manage multiple object groups. The virtual machines share information such that the object groups can be moved between virtual machines in the virtual machine cluster, thereby allowing the virtual machine cluster to act as one logical virtual machine.

Patent Agency Ranking