At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Techniques for phase tuning for process optimization
Techniques are provided for determining how thick or how deep to make the phased regions of a lithography mask. One example embodiment provides a method that...
Enabling hypertext elements to work with software applications
Variables incorporated into a hypertext markup language document enable location of hypertext elements. Once the variable is located, the information contained...
Detection and recovery of HARQ NAK-to-ACK feedback error in wireless
In wireless communication networks that use ARQ/HARQ feedback protocols, when a first device receives an apparent HARQ ACK from a second device, the first...
Scaling factors for hard decision reads of codewords distributed across
Embodiments include methods, apparatuses, and instructions for encoding a codeword of data as codeword portions stored across multiple die in a non-volatile...
Systems, methods, and apparatus to virtualize TPM accesses
Embodiments of system, method, and apparatus for virtualizing TPM accesses is described. In some embodiments, an apparatus including a CPU core to execute a...
Device, system, and method for multi-resource scheduling
A method, apparatus and system for selecting a highest prioritized task for executing a resource from one of a first and second expired scheduling arrays, where...
MFENCE and LFENCE micro-architectural implementation method and system
A system and method for fencing memory accesses. Memory loads can be fenced, or all memory access can be fenced. The system receives a fencing instruction that...
System and method for accessing memory
A close proximity memory arrangement maintains a point to point association between DQs, or data lines, to DRAM modules employs a clockless state machine on a...
Dynamic priority control based on latency tolerance
A dynamic priority controller monitors a level of data in a display engine buffer and compares the level of data in the display engine buffer to a plurality of...
Virtualizing a powered down input/output device
Embodiments of systems, apparatuses, and methods for virtualizing a powered-down input/output device are disclosed. In one embodiment, an apparatus includes a...
Cloud-based spectrum management services
A platform to facilitate transferring spectrum use rights is provided that includes a database to ascertain information regarding available spectrum for use in...
Learning concept templates from web images to query personal image
Methods and apparatus to generate templates from web images for searching an image database are described. In one embodiment, one or more retrieved images...
System and method for automatically defining and identifying a gesture
A system and method for creating a gesture and generating a classifier that can identify the gesture for use with an application is described. The designer...
Reuse of digital interface for multiple components
In one embodiment, a circuit can selectively adjust a current for driving a load. The circuit includes a sensor configured to measure a magnetic field...
Method, apparatus, and system for sliding matrix scoreboard utilized in
auto feedback closed loops
Requests are identified for equalization coefficients and a plurality of coefficient selections are tracked relating to the requests. A matrix is maintained...
Switch fabric primitives
Techniques are described for optimizing broadcast and collect primitives in switch fabrics. A switch is described for use in a switch fabric that includes a...
Physical uplink control channel (PUCCH) resource mapping using an enhanced
physical downlink control channel...
Technology for physical uplink control channel (PUCCH) resource mapping corresponding to an enhanced physical downlink control channel (ePDCCH) is disclosed....
Systems and methods for high rate OFDM communications
Messages transmitted between a receiver and a transmitter are used to maximize a communication data rate. In particular, a multicarrier modulation system uses...
HARQ-ACK handling for unintended downlink sub-frames
Disclosed in some examples is a method for providing a HARQ response in an LTE network for a PUCCH format 1b. The method includes receiving one or more downlink...
Enabling coexistence of high-density and low-density transmissions
Embodiments may comprise logic such as hardware and/or code to enable coexistence of high-density and low-density transmissions with a modified CSMA protocol....
Apparatus, system and method of controlling data flow over a wireless
communication link with credit allocation
Some demonstrative embodiments include apparatuses, systems and/or methods of controlling data flow over a wireless communication link with credit allocation....
Method and sytem for telecine detection and restoration
A method and system are disclosed. The method includes receiving a video clip including a plurality of frames. The method further includes detecting a telecine...
Methods and arrangements for smart sensors
Generally, smart sensors, logic to process messages from smart sensors, and smart sensor systems are described herein. Embodiments may comprise logic such as...
Low power oscillator with negative resistance boosting
Representative implementations of devices and techniques provide increased negative resistance to an oscillator circuit. A capacitance divider and/or a feedback...
Phase frequency detector
Described is an apparatus comprising: a first phase frequency detector (PFD) to determine a coarse phase difference between a first clock signal and a second...
Semiconductor device with embedded interconnect pad
A semiconductor device comprising: a lower semiconductor package that comprises a first set of one or more semiconductor dies, an upper semiconductor package...
Conversion of thin transistor elements from silicon to silicon germanium
Embodiments of the present disclosure provide techniques and configurations associated with conversion of thin transistor elements from silicon (Si) to silicon...
Helicoil spring backing socket
Methods of forming a socket assembly and associated structures formed thereby are described. Those methods and structures may include forming a socket assembly...
Providing a locking technique for electronic displays
In one embodiment, the present invention includes a method for receiving in a persistent electronic display an authentication code from an end user, determining...
Protecting information processing system secrets from debug attacks
Embodiments of an invention for protecting information processing system secrets from debug attacks are disclosed. In one embodiment, a processor includes...
Establishing network security using internet protocol security policies
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and...
Facilitating varied access based on authentication scoring
Systems and methods may provide for determining a composite false match rate for a plurality of authentication factors in a client device environment....
Mobile platform with sensor data security
Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may...
Systems and methods for data-parallel processing
Methods, systems, and mediums are described for scheduling data parallel tasks onto multiple thread execution units of processing system. Embodiments of a...
Software-based thread remapping for power savings
On a multi-core processor that supports simultaneous multi-threading, the power state for each logical processor is tracked. Upon indication that a logical...
Method and apparatus and record carrier
Method of generating respective instruction compaction schemes for subsets of instructions to be processed by a programmable processor, comprising the steps of...
Fault tolerance of multi-processor system with distributed cache
A semiconductor chip is described having different instances of cache agent logic circuitry for respective cache slices of a distributed cache. The...
Power gating functional units of a processor
In one embodiment, the present invention includes an apparatus having a core including functional units each to execute instructions of a target instruction set...
Split deep power down of I/O module
I/O logic can be separated into critical and non-critical portions, with the non-critical portions being powered down during processor idle. The I/O logic is...
Controlling temperature of multiple domains of a multi-domain processor
using a cross domain margin
In one embodiment, the present invention includes a method for determining, in a controller of a multi-domain processor, whether a temperature of a second...
Method and apparatus to process SHA-1 secure hashing algorithm
A processor includes an instruction decoder to receive a first instruction to process a SHA-1 hash algorithm, the first instruction having a first operand to...
Systems and methods for controlling access to supplemental content
integrated into existing content
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment,...
Protecting keystrokes received from a keyboard in a platform containing
Systems and methods of managing keystroke data in embedded keyboard environments may involve transferring a mode request from a management controller to an...
Device, method, and system for secure trust anchor provisioning and
protection using tamper-resistant hardware
A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database...
Scatter-gather intelligent memory architecture for unstructured streaming
data on multiprocessor systems
A scatter/gather technique optimizes unstructured streaming memory accesses, providing off-chip bandwidth efficiency by accessing only useful data at a fine...
Binary search pipeline
Efficient hardware implementations of a binary search algorithm are provided.
Apparatus, system, and method for improving read endurance for a
Described are an apparatus, system, and method for improving read endurance for a non-volatile memory (NVM). The method comprises: determining a read count...
Techniques for using an assigned switch identification at an input/output
Examples are disclosed for assigning a switch identification to data received at an input/output device coupled to a host device. In some examples, the data may...
Entropy-based (self-organizing) stability management
In some embodiments, the invention involves calculating entropy-based stability values to be used in a framework to build a new class of network control...
Feedback receiver for antenna tuner calculations
Some embodiments of the present disclosure relate to a feedback receiver comprising a threshold comparator configured to determine if the amplitude of a...