Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

932results about How to "Effective resources" patented technology

Extending the capability of computing devices by using dynamically scalable external resources

Techniques for extending the capabilities of computing environments and / or systems are disclosed. A scalable and dynamic external computing resource can be used in order to effectively extend the internal computing capabilities of a computing environment or system. The scalable and dynamic external computing resource can provide computing resources that far exceed the internal computing resources, and provide the services as needed, and in a dynamic manner at execution time. As a result, a computing device may function with relatively limited and / or reduced computing resources (e.g., processing power, memory) but have the ability to effectively provide as much computing services as may be needed, and provide the services when needed, on demand, and dynamically during the execution time.
Owner:SAMSUNG ELECTRONICS CO LTD

Dynamically reconfigurable vision system

A closed-loop vision system is disclosed that utilizes a concept known as Dynamically Reconfigurable Vision (DRV), which is adaptive image sensing driven by a computer or human operator's response to changing scenery. The system reduces the amount of irrelevant video information sensed and thus achieves more effective bandwidth and computational resource utilization, as compared to traditional vision systems. One or more reconfigurable photodetector arrays sensitive to either visible, infrared or ultraviolet radiation are present in the DRV system. These photodetector arrays feature on-chip means for spatial and temporal data reduction implemented through multiple independently controllable, time-correlated, frequently overlapping windows on the photodetector array that may be programmed according to their size, location, resolution, integration time, and frame rate. All photodetector array windows are dynamically reconfigurable in real time on a frame-by-frame basis. Furthermore, a DRV system is constructed in a client-server architecture in which a vision processor client passes window request command messages to the reconfigurable photodetector array server, which in turn delivers the requested video back to the client processor. The ability to simultaneously reconfigure, integrate, process, and readout multiple photodetector array video windows is an important characteristic of the DRV system.
Owner:COMPTEK AMHERST SYST INC

Method for dynamically reprovisioning applications and other server resources in a computer center in response to power and heat dissipation requirements

Applications and other server resources in a computer center are dynamically reprovisioned in response to power consumption and heat dissipation loads. Power consumption and temperature of each of a plurality of data center components which comprise the computer center are monitored. Based on the monitored power consumption and temperature, one or more applications from one or more data center components are relocated to other data center components of the computer center as needed to change power consumption and heat dissipation loads within the computer center. Also, based on the monitored power consumption and temperature, one or more applications running on one or more data center components of the computer center may be rescheduled as needed to change power consumption and heat dissipation loads within the computer center. Cooling devices within the computer center may also be controlled as needed to change heat dissipation loads within the computer center.
Owner:IBM CORP

Systems and methods for intelligent medical vigilance

An intelligent medical vigilance system that observes and analyzes, and, only in the event of a clinically significant negative condition, notifies and reports the event to the care staff utilizing the hospital's existing nurse call system. The device includes a bedside unit connected to a pad or coverlet with a sensor array (placed under the patient) and also to an existing hospital nurse call system via an interface. Within the physical bedside unit are a signal processor and an alarm processor that measure data and evaluate whether a clinically significant event is occurring. The bedside unit is a wall-mounted unit with a display that becomes active when an alarm condition is enabled. The sensing pad or coverlet is a thin, piezoelectric film, or other similar sensing technology, with an array of sensors sheathed in soft padding and is not directly in contact with the skin of the patient. The nurse call feature is made up of hardware, software and cabling to connect to the nurse call system already installed in the hospital or care facility. The monitoring system can also be installed in vehicles to monitor operator physiological conditions. Vigilance alarms are suspended if a patient is detected out of bed. An unable-to-measure alert is provided if the system is unable to reliably monitor. Bed exit alarms can be placed into a pause mode for supervised bed exit of patients on bed restriction. An alert message is generated and maintained on the display screen to inform a responding caregiver of the time and reason for any alarm.
Owner:HOANA MEDICAL

Demand responsive method and apparatus to automatically activate spare servers

A server and method of its operation adapt the number of server applications within the server. The server is connected to a computer network. The server comprises one or more active server applications, a load detector, an inactive additional server application and an allocator. The load detector, which may be part of a load balancer, is connected to the one or more server applications and the computer network. The allocator is connected to the load detector and the additional server application. The allocator causes the additional server application to activate in response to a load condition. The method measures a load on the server, detects when the load exceeds a threshold and, in response thereto, activates an additional server application on the server. Optionally, the method also detects when the load is less than a deactivation threshold, and in response thereto, deactivates the additional server application. Also disclosed is a system comprising a plurality of computers, one or more connections to one or more servers, and a module. Each of the computers is capable of hosting a server application. The module is connected to the: computers and the connection(s). The module receives a request for an additional server application from one of the servers. Such a request may, for example, be generated when the server is experiencing a surge. In response to the request, the module activates the server application on one or more of the computers so as to support the requesting server.
Owner:VL COLLECTIVE IP LLC

Grouping based resource allocation method, method for transmitting signal using the same, and grouping based resource allocation controller

A grouping based resource allocation method, a method for transmitting a signal using the same, and a grouping based resource allocation controller are disclosed. That is, the method including grouping a plurality of user equipments (UEs) to a predetermined number of groups using feedback information received from the plurality of UEs and dynamically allocating communication resources to the UEs included in the groups according to the group based feedback information and the method for transmitting the signal using the same are disclosed. In addition, a grouping based resource allocation controller including a grouping module and control module for performing the above-described method in a base station is disclosed.
Owner:LG ELECTRONICS INC

Method and apparatus for determining if stored memory range overlaps key memory ranges where the memory address space is organized in a tree form and partition elements for storing key memory ranges

An efficient method and apparatus for storing and retrieving memory ranges is disclosed. A key range that is stored or to be stored is associated with a node in the tree hierarchy encompassing the entire memory address space. All previously stored ranges are listed or otherwise associated with each node, and all possible nodes that may contain ranges that overlap the key range, regardless of starting or ending locations or range length, are found. Partitions are developed in the tree structure of the available address space and the width of the key range (w), the widths of the partitions (d), and the range of offsets in the starting location of the key range with respect to a partition (o) are used to develop a formula that finds a partition suitable for storing the key range. Hashing and dynamic tree building may be used.
Owner:NETWORK APPLIANCE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products