At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Personalized search library based on continual concept correlation
A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a...
Systems, apparatuses, and methods for performing a double blocked sum of
Embodiments of systems, apparatuses, and methods for performing in a computer processor vector double block packed sum of absolute differences (SAD) in response...
Heterogeneous input/output (I/O) using remote direct memory access (RDMA)
and active message
Methods and apparatus to provide heterogeneous I/O (Input/Output) using RDMA (Remote Direct Memory Access) and/or Active Message are described. In an...
Described is a reconfigurable transmitter which includes: a first pad; a second pad; a first single-ended driver coupled to the first pad; a second single-ended...
Enhanced security for accessing virtual memory
A disclosed method includes obtaining a physical address corresponding to a virtual address responsive to detecting a virtual address associated with a memory...
Instruction and logic for support of code modification in translation
A processor includes a core with logic to execute a translated instruction. The translated instruction is translated from an instruction stored in a memory...
Asymmetric set combined cache
Embodiments are generally directed to an asymmetric set combined cache including a direct-mapped cache portion and a multi-way cache portion. A processor may...
Hardware prefetcher for indirect access patterns
Two techniques address bottlenecking in processors. The first is indirect prefetching. The technique can be especially useful for graph analytics and sparse...
Method and apparatus for treatment of state confidence data retrieved from
a non-volatile memory array
Various embodiments are generally directed to an apparatus, method and other techniques to retrieve data from a non-volatile memory, and to read a memory cell...
Operation of software modules in parallel
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media (transitory and non-transitory) are described herein for...
Enabling a cloud to effectively assign workloads to servers
In accordance with some embodiments, a public infrastructure as a service (IaaS) user can provide a file, to a cloud service provider, with information about...
Processor having multiple cores, shared core extension logic, and shared
core extension utilization instructions
An apparatus of an aspect includes a plurality of cores and shared core extension logic coupled with each of the plurality of cores. The shared core extension...
Method and apparatus for obtaining a call stack to an event of interest
and analyzing the same
In one embodiment, a processor includes a performance monitor including a last branch record (LBR) stack to store a call stack to an event of interest, where...
Method and device to distribute code and data stores between volatile
memory and non-volatile memory
A method, device, and system to distribute code and data stores between volatile and non-volatile memory are described. In one embodiment, the method includes...
Locking hinge assembly for electronic device
In one embodiment an electronic device comprises a housing having a first section and a second section comprising a display coupled to the first section by a...
Organic space transformer attachment and assembly
Electronic device assemblies and methods including an organic substrate based space transformer are described. One assembly includes a space transformer...
Tungsten gates for non-planar transistors
The present description relates to the field of fabricating microelectronic devices having non-planar transistors. Embodiments of the present description relate...
Detection of a leading stroke risk indicator
Embodiments of a system and method for detecting a leading stroke risk indicator using low-cost, non-contact visual computing methods are generally described...
Methods and arrangements for a low power device in wireless networks
Some new low power architecture devices may, e.g., be associated with in a new device category in the IEEE 802.11ah Standard for devices with low power...
User equipment and method for contention-based communications over
allocated PUSCH resources
Methods for contention-based transmission with contention-free feedback for reduced latency in LTE Advanced networks and an enhanced PUCCH are generally...
Network assisted parameter estimation in the presence of inter-cell
Embodiments provide improved interference classification and parameter estimation at a User Equipment (UE) that uses received scheduling information associated...
Method and apparatus for autonomous cluster head selection for
The present disclosure presents embodiments of a system and method for improved uplink transmission management in a network that includes one or more...
Forming carrier aggregation timing advance groups in a heterogeneous
Technology for forming carrier aggregation timing advance groups in a heterogeneous network (HetNet) is disclosed. One method comprises assigning at least a...
Apparatus, method and system of tethering between a mobile device and a
Some demonstrative embodiments include devices, systems and methods of tethering between a mobile device and a network. For example, a first cellular device may...
Radio resource control messaging for dual connectivity networks
A 3GPP LTE protocol enhancement may realize the full benefit of dual connectivity in Long Term Evolution (LTE) networks by providing a mechanism to carry Radio...
Methods and arrangements for channel access in wireless networks
Some embodiments provide a normal rate preamble detector to detect a signal transmitted in accordance with a first set of modulation and coding schemes and a...
Authentication and authorization in a wearable ensemble
Various systems and methods for authentication and authorization in a wearable ensemble are described herein. A system for authenticating a wearable device...
Apparatuses, systems, and methods for differentiation of payload size for
Wireless mobile devices or user equipments (UEs) may communicate directly with other UEs, e.g., using device-to-device ("D2D") direct discovery and ...
Identification of rogue access points
Technologies for identifying rogue access points having an actual location different from a registered location include a computing device to receive a unique...
Managing traffic flow on a network path
A network device determines the traffic specification values based on the session values that represent the application parameters of an application, which is...
Allowing varied device access based on different levels of unlocking
Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the...
Technologies for secure bootstrapping of virtual network functions
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function...
Determination of a suitable target for an initiator by a control plane
A first computational device receives a response generated by a second computational device for a third computational device. A target that is suitable for use...
Wireless device, method, and computer readable media for signaling a
resource allocation in a high-efficiency...
Wireless device, computer readable medium, and methods for signaling a resource allocation in a high-efficiency (HE) signal field are disclosed. A HE wireless...
Soft buffer management
Soft buffer management circuitry is provided for use in a device of a wireless communication system. The soft buffer management circuitry has input circuitry...
Notification by network element of packet drops
Methods and apparatus for implementing notification by network elements of packet drops. In response to determining a packet is to be dropped, a network element...
System, device, and method for securing voice authentication and
end-to-end speech interaction
A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The...
Method for determining a performance of a MIMO communication and
A method for determining a performance of a MIMO communication is described comprising determining an estimate for the performance of the communication when...
High frequency time interleaved digital to time converter (DTC)
Described herein are technologies related to an implementation of a time interleaved digital-to-time converter (DTC) topology to generate high frequency phase...
Systems and apparatuses for performing CABAC parallel encoding and
Apparatuses, systems, and computer program products that encode and/or decode information of a video stream, such as an MPEG-4 video stream, are disclosed. Some...
Spin transfer torque based memory elements for programmable device arrays
Disclosed herein are semiconductor device arrays, such as, Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Arrays (CPLAs) that use...
Scalable crossbar apparatus and method for arranging crossbar circuits
Described is an apparatus (e.g., a router) which comprises: multiple ports; and a plurality of crossbar circuits arranged such that at least one crossbar...
Signal amplifier with active power management
A system for amplifying a signal with active power management according to one embodiment includes a first digital to analog converter (DAC) circuit configured...
Dual mode voltage regulator with reconfiguration capability
A dual mode voltage regulator according to one embodiment includes a passive regulator circuit, a switching regulator circuit, and a controller circuit...
Integration of wireless charging unit in a wireless device
Described herein are techniques related to one or more systems, apparatuses, methods, etc. for implementing a wireless charging and a wireless connectivity in a...
Thermal management structure for low-power nonvolatile filamentary switch
Heat-trapping bulk layers or thermal-boundary film stacks are formed between a heat-assisted active layer and an associated electrode to confine such transient...
Piezoresistive resonator with multi-gate transistor
An embodiment includes a first nonplanar transistor including a first fin that includes first source and drain nodes, and a first channel between the first...
Semiconductor device contacts
Techniques are disclosed for forming contacts in silicon semiconductor devices. In some embodiments, a transition layer forms a non-reactive interface with the...
Semiconductor structure having a capacitor and metal wiring integrated in
a same dielectric layer
Semiconductor structures having capacitors and metal wiring integrated in a same dielectric layer are described. For example, a semiconductor structure includes...
Integrated circuit assembly that includes stacked dice
An integrated circuit assembly that includes a substrate; a member formed on the substrate; a first die mounted to the substrate within an opening in the member...