Abstract:
An apparatus, program product and method utilize a heuristic-based algorithm such as simulated annealing to order program code segments in a computer memory to provide improved computer performance in terms of memory access, e.g., by minimizing cache misses or other memory-related performance penalties that may be present in a multi-level memory architecture. Program code is ordered in a computer memory by selecting an ordering from among a plurality of orderings for a plurality of program code segments using a heuristic algorithm, and ordering the plurality of program code segments in a memory of a computer using the selected ordering.
Abstract:
A method and apparatus is provided for idling a clock synchronizing circuit during at least a portion of time during execution of a refresh operation in a memory device. In a memory device receiving an external clock signal, a method and apparatus for executing a refresh operation is provided that includes initiating at least one refresh operation in the memory device, and ceasing generation of an internal clock signal timed with respect to the external clock signal for at least a portion of the time in which at least one refresh operation takes to complete.
Abstract:
An insulating layer (24, 66, 82) is formed over a stack (14) of materials and a semiconductor substrate (12) and an implant is performed through the insulating layer into the semiconductor substrate. In one embodiment, spacers (26) are formed over the insulating layer (24), the insulating layer (24) is etched, and heavily doped regions (36) are formed adjacent the spacers. The spacers (26) are then removed and extension regions (50) and optional halo regions (46) are formed by implanting through the insulating layer (24). In one embodiment, the insulating layer (24) is in contact with the semiconductor substrate (12). In one embodiment, the stack (14) is a gate stack including a gate dielectric (18), a gate electrode (16), and an optional capping layer (22). The insulating layer (24, 66, 82) may include nitrogen, such as silicon nitride and aluminum nitride. In another embodiment, the insulating layer (24, 66, 82) may be hafnium oxide.
Abstract:
An EEPROM cell (10) formed on a substrate (18) using conventional process steps is provided. The cell (10) includes first (12) and second (14) conductive regions in the substrate (18) below the substrate's outer surface (28), and the first (12) and second (14) conductive regions are laterally displaced from one another by a predetermined distance (32). The cell (10) also includes an insulating layer (20) outwardly from the outer surface (28) of the substrate (18) positioned so that its edges are substantially in alignment between the first (12) and second (14) conductive regions. The cell (10) further includes a floating gate layer (22) outwardly from the insulating layer (20) and in substantially the same shape as the insulating layer (20). The cell (10) also includes a diffusion region (24 or 26) that extends laterally from at least one of the first (12) and second (14) conductive regions so as to overlap with the insulating layer (20). The diffusion region (24 or 26) provides a source of charge for placement on the floating gate layer (22) when programming the EEPROM cell (10).
Abstract:
A secured network system comprising a readykey controller which has a first card reader and a power relay switch connected thereto. The user of the system inserts a microchip embedded card into the first card reader which then transmits an authorization signal to the readykey controller. The readykey controller then activates a power relay switch affixed to the computer which connects the computer's power supply to an external power source activating the computer. The secured network system also has a data relay switch which includes a manual A/B secured network switch. The manual A/B switch allows the user to receive and process classified data, by setting the switch to a predetermined position which connects a secured network server to the computer. The user inserts his proximity card into a second card reader which transmits a second authorization signal to the readykey controller. The readykey controller, responsive to the second authorization signal, activates the data relay switch. Activating the data relay switch connects the secured network switch to the secured network server via the data relay switch which allows for the transmission of classified data between the secured network server and the personal computer.
Abstract:
The subject application concerns novel compounds with useful biological properties. For example, these compounds can be used as antinflammatory, anti-proliferative, immunomodulatory, and/or neuroprotective agents. Specific examples of the compounds of the subject invention include Secobatzelline A and Secobatzelline B, which can be isolated from marine sponges.
Abstract:
A secured network system comprising a readykey controller which has a first card reader and a power relay switch connected thereto. The user of the stem inserts a microchip embedded card into the first card reader which then transmits an authorization signal to the readykey controller. The readykey controller then activates a power relay switch affixed to the computer which connects the computer's power supply to an external power source activating the computer. The secured network system also has a data relay switch which includes a manual A/B secured network switch. The manual A/B switch allows the user to receive and process classified data, by setting the switch to a predetermined position which connects a secured network server to the computer. The user inserts his proximity card into a second card reader which transmits a second authorization signal to the readykey controller. The readykey controller, responsive to the second authorization signal, activates the data relay switch. Activating the data relay switch connects the secured network switch to the secured network server via the data relay switch which allows for the transmission of classified data between the secured network server and the personal computer.
Abstract:
An adjustable height fill valve for controlling the water level in a storage tank for a toilet includes a riser mounted in the tank and connected to a pressurized water supply. The riser includes an anti-siphon body telescopically mounted over a fixed shank. The anti-siphon body telescopically adjusts between retracted and extended positions. A pilot valve is mounted on the anti-siphon body in fluid communication with the water supply. A float is mounted in association with the pilot valve to selectively open or close the pilot valve depending on the water level in the tank. A latch on the anti-siphon body and a series of stops on the shank are releasably engageable to adjustably fix the position of the body on the shank between the retracted and extended positions. The stops comprise first and second sets of axially spaced and interleaved fingers which define a serpentine track into which the latch extends.
Abstract:
A secured network system comprising a readykey controller connected to a st card reader and a power relay switch. The user inserts a microchip embedded card into the first card reader which transmits a first electrical authorization signal to the readykey controller indicating that the user is authorized to use a computer for receiving and processing classified data. The readykey controller then supplies a first enable signal to a power relay switch activating the power relay switch which couples the computer's power supply to an external power source. The secured network system also allows the user to receive and process classified data, by setting a manual A/B switch to a predetermined position which allows a secured network server to be connected to the computer. The user next inserts his proximity card into a second card reader which then transmits a second electrical authorization signal to the readykey controller indicating that the user is authorized to receive and process classified data. The readykey controller next sends a second enable signal to a data relay switch. The second enable signal enables the data relay switch connecting the secured network switch to the computer which allows for the transmission of classified data between the secured network server and the computer.