WO2003065171A2 - A system and method for managing dataflows - Google Patents

A system and method for managing dataflows Download PDF

Info

Publication number
WO2003065171A2
WO2003065171A2 PCT/US2003/003032 US0303032W WO03065171A2 WO 2003065171 A2 WO2003065171 A2 WO 2003065171A2 US 0303032 W US0303032 W US 0303032W WO 03065171 A2 WO03065171 A2 WO 03065171A2
Authority
WO
WIPO (PCT)
Prior art keywords
widget
data
type
widgets
flow
Prior art date
Application number
PCT/US2003/003032
Other languages
French (fr)
Other versions
WO2003065171A3 (en
Inventor
John Fairweather
Original Assignee
John Fairweather
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by John Fairweather filed Critical John Fairweather
Priority to AU2003210789A priority Critical patent/AU2003210789A1/en
Publication of WO2003065171A2 publication Critical patent/WO2003065171A2/en
Publication of WO2003065171A3 publication Critical patent/WO2003065171A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K13/00Conveying record carriers from one station to another, e.g. from stack to punching mechanism
    • G06K13/02Conveying record carriers from one station to another, e.g. from stack to punching mechanism the record carrier having longitudinal dimension comparable with transverse dimension, e.g. punched card
    • G06K13/08Feeding or discharging cards
    • G06K13/0806Feeding or discharging cards using an arrangement for ejection of an inserted card
    • G06K13/0825Feeding or discharging cards using an arrangement for ejection of an inserted card the ejection arrangement being of the push-push kind
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/42Syntactic analysis
    • G06F8/427Parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4488Object-oriented
    • G06F9/4493Object persistence
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/912Applications of a database
    • Y10S707/913Multimedia
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/964Database arrangement
    • Y10S707/966Distributed
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99942Manipulating data structure, e.g. compression, compaction, compilation

Definitions

  • UCS Unconstrained Systems'
  • An unconstrained system usually only samples from the flow going through the information pipe.
  • the UCS is neither the source nor the destination for that flow, but simply a monitoring station attached to the pipe capable of selectively extracting data from the pipe as it passes by.
  • the present system and method provide such a system.
  • three basic components must be created and integrated:
  • a data-flow based scheduling environment that balances the needs of data initiated program execution as a result of flows with other practical considerations such as user responsiveness, event driven invocation, user interface considerations, and the need to also support control-flow based paradigms where required.
  • the pins on the widgets include both pins used to control execution of a widget as well as pins used to receive data input from a data flow.
  • the system and method further include a debugging environment that enables visual debugging of one or more widgets (or collections s widgets).
  • Data control techniques include the concepts of "OR” and “AND” consumption thereby permitting either consumption immediately or only after all widget inputs have received the token. Additional extensions to this framework will also be described that relate to the environment, the programming language and the interface.
  • Figure 1 illustrates an example of a conditional statement.
  • Figure 2 illustrates an example case statement using an atomic widget.
  • FIG. 3 illustrates a sample embodiment of a Widget Editing Mode (WEM) window 300.
  • WEM Widget Editing Mode
  • Figure 4 illustrates a full-featured icon-editor that allows alteration of the widget icon.
  • Figure 5 illustrates a sample embodiment of a file menu 415 of the WEM.
  • Figure 6 illustrates a sample Add menu 417 of the WEM.
  • Figure 7 illustrates a sample Align menu 418 of the WEM.
  • Figure 8 illustrates a sample Display menu of the WEM.
  • Figure 9 illustrates a sample setup menu 421.
  • Figure 10 illustrates a sample embodiment of the debug menu 422 of the WEM.
  • Figure 11 illustrates a sample Pin information dialog 1100.
  • Figure 12 illustrates a user in the process of choosing the type 1210 of a constant symbol in the WEM diagram within the type pop-up menu 1210 of the constant information window 1200.
  • Figure 13 illustrates a dialog window 1300 generated in connection with selection of the view or widget information window in the setup menu 421.
  • Figure 14 illustrates a simple calculator widget/view 1400.
  • Figure 15 illustrates the structural components of the calculator widget/view 1400.
  • Figure 16 illustrates an internal diagram of the calculator as it would appear in the preferred Widget Editing Mode window.
  • the system is preferably comprised of the following components:
  • the present system and method provide such a system.
  • three basic components must be created and integrated:
  • a data-flow based scheduling environment that balances the needs of data initiated program execution as a result of flows with other practical considerations such as user responsiveness, event driven invocation, user interface considerations, and the need to also support control-flow based paradigms where required.
  • a 'widget' is the fundamental building block of the system.
  • a widget contains certain functionality encapsulated along with a definition of the inputs and outputs necessary to interface to that functionality.
  • An atomic widget contains compiled code that generally cannot be either examined or altered within the framework of the environment.
  • a compound widget contains an inner structure that defines any subordinate widgets that are required to implement the required functionality, together with the data flows between these contained widgets.
  • compound widgets can be opened, examined, and altered by system users.
  • Compound widgets may themselves be combined with other widgets (both atomic and compound) to yield higher-level compound widgets, to any arbitrary level of nesting. At the uppermost level, widgets are combined into 'views' that may be thought of as complete mini-applications that preferably include all necessary Ul functionality.
  • Atomic widgets can be grouped into functionally related sets known as widget packs.
  • widget packs appear and are manipulated in the Widget Editing Mode (WEM) diagram as a single unit, but each of the members of the unit can be executed independently of the other members.
  • the principal functional member of a widget pack i.e., the 'do it' function
  • all other widgets in the pack are degenerate (known as degenerate widgets).
  • the pack metaphor is necessary to support asynchronous access to elements or attributes of the internal state of a logical functionality implemented by the pack. Without packs, data-flow is essentially a synchronous metaphor where widgets do not run until all necessary inputs have arrived.
  • the support of 'exclusive' pins (described later) is another exception to this rule.
  • pins Compound and atomic widget inputs and outputs as displayed during WEM, are collectively referred to as pins.
  • a formal pin is one that must be connected in order for the widget to operate correctly, a degenerate pin need only be connected if required in the particular use of the widget and may otherwise be left unconnected.
  • Degenerate pins come in two varieties; those that assume a default value within the widget when unconnected (defaulted degenerate pins), and those that do not (un-defaulted degenerate pins).
  • a View has associated with it a specialized compound widget known as a view widget which contains a collection of atomic or compound widgets, each of which may have at most one user interface region known as a pane. These regions range.from buttons, windows, controls, etc. to arbitrarily complex closed shapes.
  • a view contains the layout information that specifies the arrangement of display panes within the enclosing window. The entire view is enclosed in a view window.
  • the system is capable of accessing and transferring between large numbers of different views both under menu control, and by use of suitable view change widgets.
  • views may be shared between users or may be unique to a particular user.
  • view widgets may have data flow inputs and outputs, but in the case of views, these are physically mediated by network events/messages that are sent to or received from other views, either in the same workstation or another node on the network.
  • a dataflow environment built on this metaphor is thus transparently distributed.
  • Type conversion widgets generally have many degenerate inputs and outputs, each of which will interface to a particular type.
  • the interface is able to recognize type conversion widgets for what they are (via a dedicated flag), and when a type conflict occurs, searches all available type converters for those that meet the necessary input and output criteria. When all suitable type converters have been identified, the user is able to select the most appropriate from a list of all converters that meet the criteria.
  • Widget data-flow inputs and outputs can be connected to other data-flow inputs and outputs (of a compatible type) in widget editing mode (WEM) in order to define the required widget functionality.
  • WEM widget editing mode
  • a single widget data output can be connected to multiple data-flow inputs.
  • the interface allows the user to choose whether the output is consumed by the first widget that has all inputs available including the input in question (OR consumption logic), or whether it is only consumed when all connected widgets have run (AND consumption logic).
  • multiple widget outputs can be connected to a single widget input, in which case the input accepts and consume each widget output as it becomes available. This situation occurs commonly in user control panels where a number of buttons effect the state of a single widget/display.
  • control-flow pins can be wired up to other control flow pins, but not to data flow pins (unless of Boolean type). Control flow wiring carries an implicit Boolean value indicating that the control flow criteria concerned has or has not been met.
  • control flow wiring carries the value false, and does not trigger any connected control flow inputs. If the condition has been met, the wiring carries a true value and triggers any connected control flow inputs. Unless explicitly altered within a widget definition, a widget's control flow output goes true immediately upon completion of execution of that widget, it goes false immediately after execution of the widget begins. If a widget's control flow input is connected, then execution of that widget cannot begin until the control flow signal to which it is connected is asserted. Normally, it is likely that compound widgets can be constructed entirely based on data flow programming and without the explicit use of control flow pins.
  • the system also permits a tie between multiple control flow outputs and a given control flow input in which case the associated widget cannot begin execution until all data flow inputs are satisfied and, either the AND or the OR of all control inputs is asserted (depending on the type of control input used). Selection of either a control flow OR/AND for a widget control input is generally performed when connecting control flow signals.
  • the system also supports connections between a single widget control flow output to multiple different control flow inputs. In this case, all widgets whose inputs are so connected cannot execute until the control flow output is asserted.
  • control flow signals are not 'consumed' by the receiving input pin, but remain asserted until source widget activity drives them false. This means that, in general, control flow signals can be multiply sourced and synced without the potential for confusion as to what will happen. In the preferred embodiment, all logical operations on the control flow signals are the responsibility of the engine/interface; this knowledge does not propagate into the widget itself. It is possible to connect a control flow signal or pin to any data flow signal of the system defined type Boolean; connection to any other data flow type is generally forbidden.
  • the degenerate widgets of a widget pack are capable of accepting and producing both formal and degenerate data flow I/O pins as well as the standard control flow pins. Individual members of a widget pack can be invoked independently of other members of the pack but all members of the pack share the same storage area; this storage area is allocated at the time the widget pack is instantiated (generally via the initialize entry point of the formal widget), and is passed by reference to each member of the pack as it is invoked by the engine. As with all other widget types, a degenerate widget of a widget pack only executes when all of its inputs become available.
  • Degenerate widgets need not provide any entry points other than the 'execute 1 entry point, the engine invokes the entry points associated with the formal widget of the pack when using entry points other than execute. All widgets of a widget pack are stored together in a single file and for the purposes of copying and other activities using the WEM menus are treated as a single unit. It is generally not possible to treat a degenerate widget of a pack as if it were a fully defined atomic widget within the normal WEM environment.
  • the various members can communicate with each other via the data area and can also directly invoke other members of the pack. As a result, it is valid for degenerate widgets of a pack to contain nothing but outputs which are presumably produced when the internal state of the pack meets certain criteria.
  • a View can be thought of as a mini application, whose functionality is defined by the widgets it contains and the data flows between them.
  • a view's appearance is most easily defined by superimposing the display components of all widgets in the view on a background that is an image.
  • Views provide the framework within which it becomes possible to instantiate and execute the various atomic and compound widgets. No widget can execute unless it is either explicitly or implicitly contained in a view.
  • Views are preferably stored in view definition files which may be accessed and initiated via the environment's view menu.
  • Each view definition file contains as a minimum the following components:
  • a specialized compound widget (a view widget) associated with the view that defines the control and data flows between the widgets that make up the view
  • Views may be in one of two states: active or inactive.
  • An active view is one that is currently executing and has therefore loaded all contained widgets into the engine where they are currently executing.
  • An inactive view contains no executing widgets and is not currently loaded into the widget engine. Every view has associated with it a window which may or may not be visible at any given time.
  • the view that is associated with the front window on the user's screen is known as the front view and only one view can be the front view at any given time. This would not necessarily be the case in alterative display environments that permit 2+ dimensional views, however.
  • views are generally not nested within (in a visual sense) other views.
  • a view is always the outermost component or container for a given user defined functionality and usually has no relation to the current screen position of any other view. Views also can be combined into groups called view packs and these views packs share a logical context much in the manner of widget packs.
  • a view has associated with it a compound widget defining the data and control flows between the display and functional widgets that go to make up the view.
  • This compound widget is known as a view widget and is similar to any other compound widget. Because it is part of a view, however, its data flow I/O pins are connected to other views by means of network events. The majority of view widgets will have zero inputs and outputs. Certain specialized views, however, may be controlled from other views and such cases the controlling view will have data flow outputs while the controlled view will have corresponding data flow inputs. View outputs may also optionally include a target view and network node in order to route the event to the intended destination.
  • the event will be sent to any views in the local environment that contain inputs whose name and type exactly match that of the view output. If no such inputs exist, the data flow output is discarded. Unlike other widget types, a view widget is scheduled (or rescheduled) whenever any of its inputs becomes available. Internal scheduling of the view, however, may be suspended should other required inputs still be undefined.
  • Any component of a view widget may also have (one or more) panes associated with it.
  • the view causes a marquee or image of that pane to appear in the view layout window where it may be re-sized (within limits) and relocated as part of the view layout process.
  • Panes are normally rectangular but it is possible to create and interact with panes that occupy any arbitrary closed region.
  • a view may be comprised of many panes, each of which represents the display region of the widget responsible for interpreting or displaying the control/display that the pane relates to. For widgets whose appearance is fully determinable at layout time (e.g., named buttons), the final widget appearance is shown in the pane during view layout.
  • the WEM window provides the interface in which views and widgets may be edited, modified or displayed.
  • the subordinate widgets and the data flow between them is displayed.
  • colored lines that join the pins of widget icons/symbols to other pins in the diagram represent data flow.
  • the color of the line can be used to convey type information. Wherever one or more lines in a WEM window is joined in terms of data or control flow, this is represented by a standard line junction symbol.
  • data-flow outputs are consumed when the widget associated with every connected input has been triggered. The user has the option to select that the output be consumed when the first widget that has a connected input is triggered.
  • conditional statement i.e., if then [else]
  • an atomic widget that accepts a string defining an arbitrary expression in terms of the widget inputs that resolves to a Boolean value either directly (because all inputs are Boolean), or as a result of use of a comparison operator within the expression.
  • This atomic widget has two degenerate outputs which are automatically displayed when the widget is placed. The first corresponds to the YES condition, the second to the NO condition.
  • the conditional widget only generates one or other degenerate outputs when it runs.
  • the conditional widget has a single formal input that accepts the Boolean expression, and a large number (up to 26) of degenerate inputs each of which will accept any scalar numeric value or a derived type.
  • Each connected degenerate input can be referred to in the expression by its lower case letter or signal name.
  • the case or switch construct is provided by an atomic widget that takes as input two values.
  • the first value is a comma-separated list of constant integer expressions (includes characters) or ranges, the second is an integer value to be evaluated against the list.
  • the output of the case widget is a variable number of degenerate Boolean outputs (each of which preferably represents one of the case conditions being satisfied) and the first of which is always the default case (i.e., no other condition satisfied). Only one case widget output will be generated on any given execution of the widget, and as for the conditional widget, it outputs the Boolean value true. If no specified condition is met then an output will be produced on the default pin.
  • the case statement within the widget 210 evaluates the integer input 220 against 5 different values or ranges. Only one of the outputs 231, 232, 233, 234, 235 will be generated as a result of widget 210 execution. This is true even if more than one condition is met due to overlapping ranges. When ranges for a case widget overlap, only the first condition in the list to be satisfied will cause an output. First, in this case, would be represented by going from top to bottom among the outputs 231, 232, 234, 234, 235.
  • case widget outputs behave identically to conditional widget outputs, they can be used to trigger other widgets via their control input pins in the same manner described above for the conditional widget.
  • the interface preferably prevents the user from connecting different inputs of a downstream widget to signals that are directly or indirectly connected to different output pins of either a conditional or a case widget within the WEM window. This is because, since only one such pin can be triggered by definition, any downstream widget that relies on more than one such widget output, will by definition never execute.
  • This condition is normally enforced by the block structure of standard programming languages but since, in a visual environment, this structure may not be so apparent, block structuring is preferably enforced by the WEM environment.
  • the outputs of a case widget may be automatically labeled with the case value. This feature is depicted in the diagram above with respect to outputs 231, 232, 233, 234, 235.
  • the WEM interface is also capable of highlighting all widgets and connections that are 'downstream' of a given selection in the WEM diagram by special Ul actions.
  • the WEM interface would also preferably prevent the user from connecting a data flow output of any widget (A) to any data flow input of a second widget (B) that either directly or indirectly is required to run in order for the widget (A) itself to become eligible to run.
  • This requirement is made in order to prevent the user from accidentally setting up data flow diagrams that have hidden loops in them that mean they will not execute (or will always execute). Note that this requirement by itself makes it impossible to construct the 'loop' programming construct using pure data flow connections and widgets not expressly designed to implement loops. Loop constructs generally require the use of a variable to pass values from one loop iteration to the next. Once initialized, the variable value is always available and hence removes the possibility of creating a data flow input condition that cannot be satisfied.
  • a data flow output that comes from code lying inside a loop cannot be directly connected to a data flow input lying outside the loop because the loop may execute many times and will therefore produce a series of outputs which will either unintentionally trigger the widget outside the loop on each pass, or more likely, if the widget outside the loop requires other non-loop inputs, will have to be queued up waiting for access to the data flow signal. It is probable that such a behavior would overload any queuing mechanism provided by the engine to handle multiply connected outputs since such a queue only needs to be as big as the number of connected outputs.
  • loops are implemented by one or more system supplied compound widgets that provide a number of degenerate universal input and output pins for passing data of any type into and out of the loop body and which allow specification of the loop behavior.
  • widget scheduling rules to be enforced by the engine is given in the table below. Many of these rules appear throughout the text above but they are summarized and augmented here in order to make the full rule set more apparent.
  • the term widget is used below to imply both atomic widgets and compound (or view) widgets. When a distinction is required, the particular widget type is explicitly stated.
  • the term signal is used below to refer to either a control flow or a data flow. Where a distinction is required, the type of signal (control or data) is explicitly stated.
  • token is used below to refer to a data flow signal to which a value has been written, but has not yet been consumed.
  • a linear compound widget is defined as a one that does not include any explicit connection to the control flow output.
  • a cyclic compound widget is defined as a one that includes an explicit connection to the confrol flow output and which therefore may include explicit loops.
  • a descendant widget Z of an ancestral widget Y within an enclosing compound widget X is defined as any widget within the WEM diagram for X that either directly or indirectly depends on data or control flow outputs from Y in order to become eligible for scheduling.
  • Z is a formal descendant widget of Y if the dependency between Y and Z is mediated by signals connected only to formal widget outputs.
  • Z is a degenerate descendant widget of Y if the dependency between Y and Z is mediated by at least one signal connected to any intervening degenerate widget output.
  • a pure data flow signal is defined as one that is not attached to a variable or constant symbol.
  • a pure descendant data flow is one that can be traced back to a given ancestor through pure data flow or confrol flow signals alone.
  • a widget is eligible for scheduling only when all of its connected data flow inputs have a token associated with them.
  • a view may be scheduled whenever any of its data flow inputs have a token associated with them but may subsequently 'hang up' should other inputs be required and still be undefined.
  • a widget has an explicit connection to its control flow input pin, then that widget (and any widgets it contains) is only eligible for scheduling when the value of the control flow pin is set to TRUE. This applies even if the widget is compound and has already started execution, (i.e., you can single-step a compound widget to any nesting level simply by explicit control of the highest level control pin).
  • Execution of a cyclic compound widget completes when the control output pin is driven TRUE by the control or data flows within the widget.
  • the implementation may encapsulate this functionality so that for standard loops, the user is unaware of the control pin connection.
  • a widget input is specified as Only on update' then that widget only becomes eligible for scheduling each time a value is written to the data flow signal connected to that input. This applies even if that signal has an un-consumable token associated with it (see below). If multiple values are written to the input signal before the connected widget is scheduled, it is scheduled only once in response to the series of updates.
  • a pure data flow that is specified as AND consumption logic (the default during construction), causes any tokens associated with that flow to be consumed only after all widgets that have input pins connected to that data flow have been scheduled and executed. If multiple widgets have input pins connected to the pure data flow signal in question, then each may be scheduled only once as a result of any given token appearing on the signal even if that token remains unconsumed.
  • the engine drives the control output pin FALSE at the time the widget is first scheduled, and TRUE when widget execution completes.
  • a trash can symbol will immediately consume any tokens associated with the data flow to which the trash can is attached (even if other widget input pins are also attached). Trash cans may not be attached to any signal which by definition cannot be consumed.
  • a widget Y within a compound widget X is identified as an 'as needed' widget (for example a dialog widget) then in addition to any other rules that might apply, that widget will not be scheduled or executed until its output is required in order to cause another widget within X to become eligible for scheduling.
  • any widget Y has been scheduled and executed within an enclosing widget X, it is automatically moved to the last position in the scheduling check sequence so that in addition to all scheduling rules outlined above, the widget Y is not even checked again for scheduling eligibility until every other widget with in X has been checked on a subsequent pass.
  • While the illustrated widgets give the appearance of passing widget inputs by value, for efficiency reasons the implementation (wherever possible) passes widget inputs and outputs by reference, not by value. Pass by value is only required in cases where the widget input is overwritten within the widget itself (by use of a variable symbol), and the signal is not simultaneously attached to a formal widget output within the WEM diagram. Because of the scheduling rules described in the table above, the internal values of any inputs to a widget that are supplied by pure data flow connections cannot change during the period of execution of that widget. Preferably, inputs that are externally attached to a variable symbol may potentially change during widget execution.
  • the scheduling algorithm forms the core of the system architecture in that all system functionality, at some level or another, is initiated as part of a view launched within the scheduling environment (referred to as the 'widget engine').
  • the WEM user interface including widget building and view editing, can be thought of as a separate application from the scheduling process itself, and could be replaced with other user interfaces without changing the widget engine itself.
  • the widget engine is a strongly-typed data flow interpreter which can read in and subsequently execute atomic and compound widgets together with the data structures that define their I/O needs and characteristics.
  • the window 300 is a standard, titled, resizable window with scroll bars 305.
  • the window 300 is used to define and edit data-flow functionality by connecting and configuring widgets 310.
  • the two blocks 315, 320 connected by arrows to the edge of the window are the input and output bar of the compound widget being viewed.
  • a single degenerate input 330 and single degenerate output pin 335 have been defined for this compound and connected to an embedded compound 310.
  • this example could be created simply by clicking on the pin 330, dragging to the destination pin 340 it is to be connected to, and setting the type.
  • the specialized pins 345, 350 at the top of the input 320 and output bars 315 are the control input pin 345 and control output pin 350 respectively.
  • their type is always equivalent to 'Boolean'.
  • the confrol output pin is wired to the constant 355, in this case true, which will enable the contents of the compound widget to run.
  • the background widget 3.60 is a pre-supplied atomic widget serving the specialized purpose of defining the background visual appearance of the associated window.
  • the tool bar 370 provides (starting from the top):
  • the arrow tool 371 is used as a toggle switch to turn options on/off, or it simply selects items.
  • the lasso tool 372 can select freeform areas by clicking down and selecting the section.
  • the hand 373 moves the entire contents of the WEM window in different directions.
  • Label 374 can place a label on any element in the WEM window.
  • the clipboard 375 is activated when information is copied or cut to the clipboard. Select it to use as a paste tool when clicked at the paste position.
  • Window size boxes 381 allow enlarging of the window.
  • the default setting is one white square. This setting will not allow the window to be enlarged further than a few inches.
  • the available settings permit expansion of the window vertically, horizontally, or both ways.
  • Grid tool 382 can be used to select to set the grid to which all data flow lines and objects snap in the window. It is possible to move a selected item from 1 to 8 pixels at a time.
  • FIG 4 a full-featured icon-editor that allows alteration of the widget icon is shown.
  • the result of double-clicking on the icon 390 in the Figure 3 is shown.
  • a menu bar 410 is provided which provides an interface to a set of unique tools. Working across the menu bar at the top of the window (from left to right):
  • the view-pack menu 411 allows navigation between various members of a view pack in order to allow single session editing of the entire pack/report. • Once widgets are created within widgets, it is possible to move up or down the widget hierarchy with a up/down menu item 412.
  • the view menu 413 allows navigation and selection of any view stored on disk.
  • the widget menu 414 allows selection of any widget stored on disk
  • the file menu 415 allows standard save/load type actions to/from disk
  • a sample embodiment of a file menu 415 of the WEM is provided in Figure 5.
  • the Edit menu 416 is a standard Edit menu much like that found in any other application.
  • the Add menu 417 allows new widgets to be chosen and added as well as allowing the addition of other objects in the WEM diagram.
  • a sample Add menu 417 of the WEM is illustrated in Figure 6. In this example, a compound widget is selected.
  • the Align menu 418 allows various aspects of the WEM diagram internal alignment to be configured.
  • a sample Align menu 418 of the WEM is illustrated in Figure 7.
  • the flow selected is "Flow left->right".
  • the Display menu 419 allows various visual components of the WEM diagram and its contents to be configured as far as their appearance in the diagram is concerned.
  • a sample Display menu of the WEM is illustrated in Figure 8.
  • the sub menu "VEM Options" is selected.
  • the Text menu 420 provides standard control over text appearance such as color, style, font, size, etc.
  • the Setup menu 421 allows access to a number of additional 'daughter' windows that can be used to examine and edit the details of the various types of objects in the WEM diagram.
  • a sample setup menu 421 is illustrated in Figure 9.
  • the Debug menu 422 is used primarily during run-time debugging of widget execution and allows examination of the state of all flows, widgets and pins and the tokens and data on them.
  • a sample embodiment of the debug menu 422 of the WEM is provided in Figure 10.
  • this dialog 1100 is generated in response to either double-clicking on a pin in the diagram or using the menu 421.
  • Various aspects of the pin including it's type (as preferably determined by the run-time type system) and any other logic associated with the pin and it's dataflow behavior can be set from this dialog.
  • dialog window 1300 generated in connection with selection of the view or widget information window in the setup menu 421 is shown.
  • the dialog window 1300 allows adjustment of a wide variety of different aspects that apply to the view or widget including file path, security settings, operation behavior, visual dimensions, behaviors, and limits, and a variety of configuration and documentation descriptors.
  • the visual language of the present invention preferably provides the following basic features:
  • Types are preferably run-time definable and examinable by the widgets themselves.
  • Widgets with typed input and output pins. Input pins provide the ability to specify default values if unconnected.
  • the language preferably supports the overt graphical specification of variables and constants that participate in the wiring.
  • a debugging means is provided, at run-time, to examine the contents and state of flows and the state of execution of all widgets involved.
  • FIG. 14 a simple calculator widget/view 1400 is shown.
  • the figure displays the structure of the view 1400 of the calculator.
  • Each section of this figure (such as the buttons, title bar, calculator display window) can be created separately, and the individual sections of the view result in the final view, which also may be created and edited in the View Editing Mode window.
  • broken-down structure comprises:
  • View Layout 1520 The view layout (the keypad itself);
  • the widget for the 9 key would act as a valve for the constant valve 9; the plus sign (+) widget would act as the valve for the add operation.
  • the VEM process allows the appearance of the calculator to be created. Once the physical appearance is complete, the internal connections must be made to enable arithmetic functions. Widgets, electronically connected to the numeric keypad of our calculator, display a different diagram, but are identical in performance to the calculator.
  • FIG 16 an internal diagram of the calculator as it would appear in the preferred Widget Editing Mode window is shown.
  • This figure illustrates a view known as a view widget, which contains a collection of atomic or compound widgets, each of which may have at most one user interface region, or pane. It is in this window that users can make modifications using the WEM capabilities described above.
  • each individual column in the diagram is described and numbered as a single item. It is described in this fashion because each element within the column performs the same general function.
  • Column 1630 consists of widgets that perform like valves, regulating the data flow or the flow of the constants 1620.
  • the data-flow scheduling algorithm is the next important part of the system.
  • the data-flow scheduling algorithm is described below by listing the algorithms for a series of recursively invoked functions.
  • the global value "EG" is a complex structure containing various context and state information used by the environment and including the values utilized by the scheduling process.
  • the top level of the data-flow based scheduling algorithm is the routine SC_ScheduIer(3 which is called in a continuous loop from the main thread of the environment.
  • This routine arbitrates the scheduling of the various active views currently loaded into the environment.
  • the principal task performed by this routine is to enforce the levels of scheduling priorities associated with the active views.
  • SC_Scheduler() makes use of a global active views scheduling structure which contains a set of list headers each of which points to the first element in a singularly linked list of active views having the same priority level. Because this routine locks the view being scheduled, any code operating in the main application thread that is called via this routine can be sure that pointers to structures within the current view will not become invalid during procedure execution.
  • SC_Scheduler() (and everything it calls) assumes that the application thread is in a critical section (i.e., can't be pre-emptively disturbed). While there are outstanding events to be processed in any view, this routine alternates between scheduling the view at the top of the pending events list (and then rotating the list) and scheduling a view according to the normal view priority scheme. In this manner the system ensures that events are processed as rapidly as possible without allowing event intensive views to suppress all other scheduling. The same mechanism is repeated in SC_ScheduleView() to the normal free walking algorithm.
  • EG->Priority find the first bit set in cycle count word j if ( EG->Priority > kLo estEPriority )
  • SC_ScheduleView() once the view itself has been selected based on pending event lists and priority.
  • This routine is called by SC_Scheduler() to give a scheduling slot to a particular view. In most cases this amounts simply to a call to SC_ScheduleNode() for the view widget, but in addition this routine must deal with the special rules associated with starting and stopping views and the propagation of their tokens. Note that an exception to the fair handling of scheduling slots is made for any widgets that are waiting for non-timer related events which have occurred, these are scheduled immediately in order to ensure that events get eaten ASAP. An example of the logic that could be used to perform this routine is provided in Appendix A.
  • SC_ScheduleNodeO The two main routines that are called by SC_ScheduleView() above are SCJScheduleNodeO and SC_ScheduleANodeQ.
  • SC_ScheduleNode() is the primary function that is responsible for enforcing the rules of data-flow in the system. This routine is recursive and is responsible for implementing the depth first tree walking scheduler algorithm.
  • SC_ScheduleNode() makes use of three basic structures: the widget descriptor record (type ET_Widget), the flow descriptor record (type ET_Flow), and the pin descriptor record (type ETJPin). The following are the scheduler uses of the relevant fields in an ET_Widget record:
  • tokenHdr This field contains the header into a dynamic list of active tokens associated with data or confrol flows inside a compound widget.
  • tokenHdr 0 if the list is empty.
  • tokenTail - This field contains the tail (last element) of the tokenHdr list.
  • sWidgNext This field contains the link elements for the list header by sWidgHdr for the surrounding compound widget (i.e., it points to the next widget in the enclosing widgets sWidgHdr list).
  • sWidgNext 0 if no more elements in the list.
  • the field sWidgPrev is the same but points in the reverse direction to sWidgNext.
  • cIpinHdr This field contains the header into a static list of contained widget input pins that are connected to the current flow.
  • cIpinHdr 0 if the list is empty.
  • an input pin to compound widget may be in the connected input pin list for a flow within the widget that contains it's parent while also being in the connected output pin list of a flow internal to its parent.
  • cOpinHdr - This field contains the header into a static list of contained widget output pins that are connected to the current flow.
  • cOpinHdr 0 if the list is empty.
  • an output pin of compound widget may be in the connected output pin list for a flow internal to its parent, while also being in the connected input pin list of a flow within the widget that contains it's parent.
  • flags - This field contains various logical flags indicating to the scheduler the state of the flow.
  • 'isConfrolflow' indicates that the flow is a control rather than a data flow.
  • 'hasToken' indicates that the flow has a token associated with it.
  • 'useORlogic' specifies OR rather than AND consumption logic.
  • 'unConsumable' indicates that tokens associated with the flow cannot be consumed.
  • 'hasBreakPoint' and 'hasWatchPoint' are used to initiate debugging activities.
  • the scheduler algorithm attempts to walk any given free (view) in the environment's active views list and when it finds an active token that can potentially be consumed by running or resuming an atomic widget, it does so.
  • the algorithm is predicated on the following facts:
  • the mission of the scheduling algorithm is to attempt to consume any active data flow tokens in the view, thereby completing the view.
  • the scheduler can be sure that by examining only what is connected to data flows with active tokens, it has examined every widget in the view that has the potential to execute.
  • this list is referred to as the token list.
  • These lists are preferably arranged in a tree structure that can be traced all the way back to the view widget itself. At any given moment, there are vastly fewer active tokens within a view than there are either widgets or data flows. Hence, the efficiency of this algorithm greatly exceeds other free traversal strategies.
  • the scheduler tree traversal algorithm is recursive, i.e., it calls itself repeatedly as it walks down the tree, starting at the view widget until it finds a leaf node (atomic widget) that can be scheduled. It then either starts or resumes that widget and when the widget completes, it returns back up the calling chain.
  • the algorithm climbs back up the path it rotates the token list for every level in the tree by moving the token that was at the front of the list (i.e., the one that determined which attached widget it chose in the downward path), to the back.
  • the effect of this repeated descent and ascent algorithm is to allocate sequential time slices, at any given level of the tree, to widgets that are as far apart as possible in the tree. This is designed to prevent undesirable bunching of time allocations to a given compound widget.
  • Atomic widgets that are higher up in the tree will get more time slices than those that are further down. This is as it should be since higher up atomic widgets generally correspond to Ul related displays and controls which must be as responsive as possible, and which will not actually be eligible to run unless the Ul event on which they are waiting has occurred.
  • One possible side effect of the algorithm is that at any given level, the smaller branches of an unbalanced free get more scheduling slots than larger ones.
  • a tree-balancing algorithm if desired, could correct this behavior.
  • SC Scheduler the caller
  • SC_Scheduler() itself then selects another view and priority group and repeats the process. Thus available CPU time slots are distributed over all views in the system according to priority. Widgets in many other views may be scheduled before SC_Scheduler() again returns to this view and performs another descent and ascent of this tree.
  • Sample code for one embodiment of SC ScheduleNode is provided in Appendix A.
  • SCjScheduleANode (schedule atomic node) is broken out separately from SC_ScheduleNode() so that nodes that are atomic can be forcefully scheduled based on non-dataflow related events.
  • Sample code for SC_ScheduleANode() is provided in Appendix A.
  • SCJStartWidgetO is responsible for checking that all the necessary conditions have been met for starting a particular widget. This routine is therefore responsible for enforcing the rules of data flow as well as the modifications to these rules described above.
  • SC_StarfWidgetQ Once SC_StarfWidgetQ has determined that a widget is eligible to run, it actually launches it using either SC_StartAWidgetO or SCjStartCwidgetQ (depending on whether the widget is atomic or compound). If the widget concerned is ineligible to run for any reason, this routine returns FALSE otherwise it returns TRUE.
  • This routine can also be called with the parameter 'JustCheckin' set to TRUE in which case it makes all necessary checks for eligibility (other than those for input availability) but does not actually cause the widget to be started.
  • SCjStartAwidgetO is called by SCJStartWidgetO once it determines that all the necessary conditions have been met to actually initiate execution of an atomic widget. Initiating execution of an atomic widget involves creating a seperate execution thread for that widget to run in. In order to maintain this seperate thread, the thread manager software requires a seperate stack area which the atomic widget will use once launched. Every atomic widget contains a stackSize field which gives the maximum size of stack that the widget anticipates will be required in order to execute. Because the atomic widget retains control of the CPU once the thread has been launched, the scheduler has no way of preventing erroneous widgets from stepping outside their stated stack allocation and thus corrupting the heap.
  • This routine can however detect that such an error has occured after the fact and when widget execution completes, SC_StartAwidget() will report an appropriate error if stack debugging is enabled.
  • the mechanism used is to place test patterns at various points within the allocated stack area, especially at the end point. When widget execution completes, these patterns will have been erased up to the deepest point that the widgets stack reached. If the test pattern at the end of the allocation has been overwritten then the widget is erroneous, otherwise the other test patterns may be used to determine actual stack requirements. Filling an area of heap with these test patterns consumes time and stack debugging should preferably be enabled only when developing new atomic widgets.
  • SC_Resume idget (aView,aWidP,NO) ; // Resume the widget if ( !( (FLAGS (aWidP) & kHasBeenlnitialized) aWidP->wThreadID) )
  • ⁇ oldFlags FLAGS (aWidP) ;
  • SC_AddAToken (iflow) // add a token to internal flow if ( iflow->value ) // dispose of old data
  • the routine SCJResumeWidgetO resumes execution of an atomic widget that has previously suspended by calling SCJSuspendO either directly or indirectly.
  • This function assumes that all necessary conditions for execution have been checked at the time the widget was started and thus it does not need to repeat such checks.
  • Resumption of an executing widget essentially consists of an explicit yield to the relevant thread.
  • the only subtelty in SC_ResumeWidget() is its use to generate certain time based events (idle, tick, second) prior to resuming the thread if the specified time interval has elapsed and the widget is waiting for the time based event specified.
  • routines SC_CheckCtrlStopO and SC_CheckCtrlStartO may be used to check a flow connected to a confrol pin to determine if it implies that a widget should be stopped/started.
  • routine SCJTimeToGobblelnputsO may be used by the scheduler to determine if it should schedule a given widget based on the state of it's input pins. The logic is complicated by the fact that 'exclusive' pins can cause widgets to fire even when only a subset of the inputs is available.
  • the routine SC_Trace2Inputs() can be used to check all the outputs of a given widget 'aWidP' to see if they directly or indirectly lead to completing the required inputs of a second widget 'cwidg'.
  • the purpose of this is to implement the 'as needed' function whereby widgets that are marked as 'as needed' will only be scheduled by the environment when by running, their outputs might potentially cause another normal widget to become eligible to run. This is the behavior required of many Ul type widgets such as dialogs. See SC_StartWidgetO for usage.
  • the routine SC_StopCWidget() is called to complete execution of a compound widget.
  • completing compound widget execution involves propagating tokens onto the output flows. Since the output flows of the compound widget may be busy, there is a possibility that the token propagation routine (SC_PropagateTokens()) may hang up.
  • SC_PropagateTokens() the token propagation routine
  • a seperate temporary thread is created to perform the compound widget completion action thus allowing for the possibility of backup.
  • the threads associated with completing compound widgets are torn down and re-cycled as soon as the token propagation is complete, also these threads only execute internal environment code, not widget code.
  • the routine SC SpontaneousTokensO is called whenever a compound widget is started by the scheduler, and is responsible for generating any spontaneously produced tokens contained within the WEM diagram for that widget.
  • Spontaneously produced tokens are generally associated with constant symbols. Note that although flows with variable symbols attached have unconsumable tokens on them, these tokens are not generated until the flow is first written to, i.e., they are not spontaneous. This routine does not check for whether the output flow is busy and hang up waiting for it to be clear. This is because this is not possible given the fact that this routine is called during widget starting at which time all internal flows are by definition free. Again to do so would be fatal to the main thread.
  • the routine SC_AddAToken(3 adds a token to an existing flow.
  • routine SC_InitializeCompoundAtomicsO is recursive and initializes all atomic widgets within the specified compound widget and any compound widgets it contains either by calling SC_StartAWidget() or by recursively calling itself as required.
  • the API definition below gives the basic public calls available to widgets/threads when accessing data on input pins and writing data to output pins.
  • the API is intended to be illustrative only and is by no means complete.
  • the header files for a sample API implementation is provided in Appendix B.
  • the function PCJNumDatalnputsO examines the Widget Input List contained in the specified (or defaulted) widget and returns the counts of the number of formal and degenerate input pins.
  • the function PC_NumDataOutputs() examines the Widget Output List contained in the specified (or defaulted) widget and returns the counts of the number formal and degenerate output pins.
  • the handle returned by PC_GetDataInputQ would preferably NEVER be de-allocated by widget code.
  • the handle returned may be subject to relocation or resizing by the scheduler across any scheduling boundary.
  • PCjSetDataOutputTypeO may be used to do the same for output pins.
  • the function PC_GetDataOutputName() is used for output pins.
  • This routine is provided in order to allow atomic widgets to implement the logic associated with degenerate output pins. Because formal outputs are by definition connected (enforced by WEM), this routine simply returns TRUE when called for formal outputs.
  • the function PCJDoesOutputHaveTokenO can be used to determine if a particular output exists for a widget and has an unconsumed token value already assigned, TRUE is returned in this case, otherwise FALSE.
  • the function preferably returns a Boolean indicating whether the assignment was completed successfully or not.
  • the value is passed to PCjSetDataOutputO as a void pointer reference, together with an integer parameter specifying the size of the output object to be created.
  • This routine copies the value into the output value handle in the heap, creating or resizing the handle as necessary. If the output flow already has a token associated with it, this function creates a temporary storage allocation to hold the value. The scheduler will copy any temporary storage values into the connected output data flow when widget execution is complete and the connected output flow becomes free to accept new tokens. Once the value has been copied, the original passed in via the 'data' parameter may be discarded. The only output of this function is the updated value in the heap and flag settings in the widget record.
  • the function PCJSetControlOutputO sets the value of the control output pin to either true or false. Most normal atomic widgets will not need to use this function since the environment will by default set the control output to false when the widget begins execution and true on completion. Only those widgets that are performing loops or synchronizing functions and whose control output is intended for modifying the normal scheduling sequence of the WEM diagram within which the widget resides will explicitly control this pin using PCJSetControlOutputO. The effect of these values on the external WEM are:
  • the function returns zero if the input was not found.
  • the widget may use the returned type ID to obtain further information about the type using the routines provided by the type manager package. Note that the type of the flow and the type of the input pin are normally the same and hence a call to PC_GetDataInpufTypeO would suffice, however certain widgets that accept a given parent type (e.g., scalar) may wish to examine the type of the flow actually connected in order to determine which descendant type was actually connected (e.g., double, int32 etc.).
  • the function returns zero if the output was not found.
  • the widget may use the returned type ID to obtain further information about the type using the routines provided by the type manager package. Note that the type of the flow and the type of the output pin are normally the same and hence a call to PC_GetOutputType() would suffice.
  • the function PC_DoesInputExistO can be used to determine if a particular input exists for a widget, TRUE is returned if the input exists, otherwise FALSE.
  • the function PCJDoesOutputExistO is similar for outputs.
  • this routine will also search on flows that have no associated token for an attached constant object or defaulted output and return any value found. This means that this routine will operate at initialize time as well as execute time.
  • This routine also has the ability to monitor changes on an input flow at run time that do not necessarily have a token associated with them. This often occurs when a widget has written a value onto a flow but has not yet completed and thus has posted no tokens.
  • the handle returned by PC_GetDataInput() should NEVER be deallocated by widget code.
  • the handle returned may be subject to relocation or resizing by the scheduler across any scheduling boundary, widgets should be careful not to de-reference the handle and use the de-reference value across such a boundary. Widgets should avoid "Locking" data handles where possible since this will reduce the schedulers ability to resize the handle in response to new data.
  • the Macintosh Operating system like all OS layers, provides an 4API where applications can allocate and de-allocate arbitrary sized blocks of memory from a heap.
  • a pointer is a non- relocatable block of memory in heap (referred to as *p in the C programming language, hereinafter "C")
  • a handle is a non-relocatable reference to a relocatable block of memory in heap (referred to as **h in C).
  • handles are used in situations where the size of an allocation may grow, as it is possible that an attempt to grow a pointer allocation may fail due to the presence of other pointers above it.
  • the need for a handle is removed entirely as a programmer may use the memory management hardware to convert all logical addresses to and from physical addresses.
  • handle based memory The most difficult aspect of using handle based memory, however, is that unless the handle is 'locked', the physical memory allocation for the handle can move around in memory by the memory manager at any time. Movement of the physical memory allocation is often necessary in order to create a large enough contiguous chunk for the new block size.
  • the change in the physical memory location means that one cannot 'de-reference' a handle to obtain a pointer to some structure within the handle and pass the pointer to other systems as the physical address will inevitably become invalid. Even if the handle is locked, any pointer value(s) are only valid in the current machine's memory. If the structure is passed to another machine, it will be instantiated at a different logical address in memory and all pointer references from elsewhere will be invalid.
  • the following invention provides a method for generating a memory reference that is capable of being transferred to different machine or memory location without jeopardizing access to relevant data.
  • the memory management system and method of the present invention creates a new memory tuple that creates both a handle as well as a reference to an item within the handle.
  • the reference is created using an offset value that defines the physical offset of the data within the memory block. If references are passed in terms of their offset value, this value will be the same in any copy of the handle regardless of the machine.
  • all that then remains is to establish the equivalence between handles, which can accomplished in a single transaction between two communicating machines. Thereafter, the two machines can communicate about specific handle contents simply by using offsets.
  • the minimum reference is therefore a tuple comprised of the handle together with the offset into the memory block, we shall call such a tuple an 'ET_ViewRef and sample code used to create such a tuple 100 in C is provided in Figure 1.
  • this tuple has been created, it becomes possible to use the ETJViewRef structure as the basic relocatable handle reference in order to reference structures internal to the handle even when the handle may move.
  • the price for this flat memory model is the need for a wrapper layer that transparently handles the kinds of manipulations described above during all de-referencing operations, however, even with such a wrapper, operations in this flat memory model are considerably faster that corresponding OS supplied operations on the application heap.
  • Figure 1 illustrates sample code used to create the minimum reference 'tuple' of the . present invention
  • Figure 2 illustrates a drawing convention that is used to describe the interrelationship between sub-layers in one embodiment of the present invention
  • FIG. 3 illustrates a sample header block that may be used to practice the- present invention
  • Figure 4 illustrates a simple initial state for a handle containing multiple structures
  • Figure 5 illusfrates the type of logical relationships that may be created between structures in a handle following the addition of a new structure
  • Figure 6 illustrates a sample of a handle after increasing the size of a given structure within the handle beyond its initial physical memory allocation
  • Figure 7 illustrates the manner in which a handle could be adapted to enable unlimited growth to a given structure within the handle
  • Figure 8 illustrates the handle after performing an undo operation
  • Figure 9 illustrates a handle that has been adapted to include a time axis in the header field of the structures within the handle;
  • Figure 10 illustrates the manner in which the present invention can be used to store data as a hierarchical tree
  • Figure 11 illusfrates the process for using the memory model to sort structures within a handle.
  • any given software aspect is built upon a number of sub-layers.
  • FIG 2 a block diagram is provided that depicts these sub-layers as a 'stack' of blocks.
  • the lowest block is the most fundamental (generally the underlying OS) and the higher block(s) are successive layers of abstraction built upon lower blocks.
  • Each such block is referred to interchangeably as either a module or a package.
  • an opaque module 200 is illustrated as a rectangular in Figure 2A.
  • An opaque module 200 is one that cannot be customized or altered via registered plug-ins. Such a form generally provides a complete encapsulation of a given area of functionality for which customization is either inappropriate or undesirable.
  • the second module illustrated as T-shaped form 210 in Figure 2B, represents a module that provides the ability to register plug-in functions that modify its behavior for particular purposes.
  • these plug-ins 220 are shown as 'hanging' below the horizontal bar of the module 210.
  • the module 210 provides a complete 'logical' interface to a certain functional capability while the plug-ins 220 customize that functionality as desired.
  • the plug-ins 220 do not provide a callable API of their own. This methodology provides the benefits of customization and flexibility without the negative effects of allowing application specific knowledge to percolate any higher up the stack than necessary.
  • most modules provide a predefined set of plug-in behaviors so that for normal operation they can be used directly without the need for plug-in registration.
  • Modules that are hidden vertically by higher-level modules are not intended to be called directly in the context depicted.
  • Figure 2C illustrates this descriptive convention.
  • Module 230 is built upon and makes use of modules 235, 240, and 245 (as well as what may be below module 245).
  • Module 230, 235 and 240 make use of module 245 exclusively.
  • the functionality within module 240 is completely hidden from higher level modules via module 230, however direct access to modules 250 and 235 (but not 245) is still possible.
  • FIG. 2D the Viewstructs memory system and method 250 is illustrated.
  • the ViewStructs 250 package (which implements the memory model described herein) is layered directly upon the heap memory encapsulation 280 provided by the TBFilters 260, TrapPatches 265, and WidgetQC 270 packages. These three packages 260, 265, 270 form the heap memory abstraction, and provide sophisticated debugging and memory tracking capabilities that are discussed elsewhere.
  • the terms ViewStructs or memory model apply only to the contents of a single handle within the heap.
  • ETJHdr A sample header block (called an ETJHdr) may be defined in C programming language as illustrated in Figure 3.
  • ET Offset fields 310, 320, 330, 340 For the purpose of discussing the memory model, we shall only consider the use of ET Offset fields 310, 320, 330, 340.
  • the word 'flags' 305 indicates the type of record follows the ET_Hdr.
  • the 'version' 350 and 'date' fields 360 are associated with the ability to map old or changed structures into the latest structure definition, but these fields 350, 360 are not necessary to practice the invention and are not discussed herein.
  • Figure 4 illustrates a simple initial state for a handle containing multiple structures.
  • the handle contains two distinct memory structures, structure 410 and structure 420.
  • Each structure is preceded by a header record, as previously illustrated in Figure 3, which defines its type (not shown) and its relationship to other structures in the handle.
  • the 'Nextltem' field 310 is simply a daisy chain where each link simply gives the relative offset from the start of the referencing structure to the start of the next structure in the handle. Note that all references in this model are relative to the start of the referencing structure header and indicate the (possibly scaled) offset to the start of the referenced structure header.
  • 'Nextltem 0'.
  • the 'parent' field 340 is used to indicate parental relationship ' s between different structures in the handle.
  • stracture B 420 is a child of structure A 410.
  • the terminating header record 430 (also referred to as an ET_Null record) always has a parent field that references the immediately preceding structure in the handle. Use of the parent field in the terminating header record 430 does not represent a "parent" relationship, it is simply a convenience to allow easy addition of new records to the handle.
  • the otherwise meaningless 'moveFrpm' field 330 for the first record in the handle contains a relative reference to the final ET_Null. This provides an expedient way to locate the logical end of the handle without the need to daisy chain through the 'nextltem' fields for each structure. . .
  • Figure 5 illustrates the logical relationship between the structures after adding a third structure C 510 to the handle.
  • structure C 510 is a child of B 420 (grandchild of A 410).
  • the insertion of the new structure involves the following steps:
  • structure C 510 is a child of B 420, which is established by pointing the 'parent' field of C's header file 520 to the start of structure B 420.
  • the present invention In addition to adding structures, the present invention must handle growth within existing structures. If a structure, such as structure B 420, needs to grow, it is often problematic since there may be another structure immediately following the one being grown (structure C 510 in the present illustration). Moving all trailing structures down to make enough room for the larger B 420 is one way to resolve this issue but this solution, in addition to being extremely inefficient for large handles, destroy, the integrity of the handle contents, as the relative references within the original B structure 420 would be rendered invalid once such a shift had occurred. The handle would then have to be scanned looking for such references and altering them.
  • FIG. 6 illustrates the handle after growing B 420 by adding the enlarged B' structure 610 to the end of the handle. As shown, the original B structure 420 remains where it is and all references to it (such as the parent reference from C 510) are unchanged. B 420 is now referred to as the "base record” whereas B' 610 is the "moved record”. Whenever any reference is resolved now, the process of finding the referenced pointer address using C code is:
  • src address of referencing structure header
  • dst address of referenced structure header if ( dst->moveFrom )
  • dst dst + dst->moveFrom;
  • ref value dst - src
  • Figure 7 illustrates the handle when B 420 must be further expanded into B" 710.
  • the 'moveTo' of the base record 420 directly references the most recent version of the structure, in this example B" 710.
  • the record B" 710 now has a 'moveFrom' 720 field that references the base record 420.
  • B's moveFrom 720 still refers back to B 420 and indeed if there were more intermediate records between B 420 and B" (such as B' 610 in this example) the 'moveTo' and 'moveFrom' fields for all of the records 420, 610, 710 would form a doubly linked list.
  • FIGURE 8 illustrates the handle after performing an 'undo' on the change from B' to B". The steps involved for 'undo' are provided below:
  • src base record (i.e., B)
  • src base record (i.e., B)
  • dst locate 'moved' record (i.e. B') by following 'moveTo' of base record if ( dst->moveTo )
  • One method for maintaining a time axis is by using a date field in the header of each structure.
  • the undo/redo mechanism can be combined with a 'date' field 910 in the header that holds the date when the item was actually changed. This process is illustrated in Figure 9 (some fields have been omitted for clarity).
  • This time axis can also be used to track the evolution of data over time.
  • the 'moveTo' fields could be used to reference future iterations of the data.
  • the base record could specify that it stores the high and low temperatures for a given day in Cairo.
  • Each successive record within that chain of stractures could then represent the high and low temperatures for a given date 910, 920, 930, 940.
  • the memory system and method can be used to represent and reference time-variant data, a critical requirement of any system designed to monitor, query, and, visualize information overtime.
  • this ability to handle time variance exists within the 'flat' model and thus data can be distributed throughout a system while still retaining variance information. This ability lends itself well to such things as evolving simulations, database record storage and transaction rollback, and animations.
  • this model can be used to represent data having multiple values depending on context. To achieve this, whatever variable is driving the context is simply used to set the 'moveTo' field of the base record, much like time was used in the example above. This allows the model to handle differing security privileges, data whose value is a function of external variables or state, multiple distinct sources for the same datum, configuration choices, user interface display options, and other multi-value situations.
  • a 'flags' field could also be used in the header record and can be used to provide additional flexibility and functionality within the memory model. For example, the header could include a 'flag' field that is split into two parts.
  • the first portion could contain arbitrary logical flags that are defined on a per-record type basis.
  • the second portion could be used to define the stracture type for the data that follows the header. While the full list of all possible stracture types is a matter of implementation, the following basic types are ⁇ examples of types that may be used and will be discussed herein:
  • kNullRecord - a terminating NULL record, described above.
  • kStringRecord - a 'C format variable length string record.
  • kSimplexRecord - a variable format/size record whose contents is described by a type-id.
  • kComplexRecord - a 'collection' element description record (discussed below)
  • kOrphanRecord - a record that has been logically deleted/orphaned and no longer has any meaning.
  • the memory wrapper layer is able to determine 'what' that record is and more importantly, what other fields exist within the record itself that also participate in the memory model, and must be handled by the wrapper layer.
  • the following definition describes a structure named 'kComplexRecord' and will be used to illustrate this method:
  • the structure defined above may be used to create arbitrary collections of typed data and to navigate around these collections. It does so by utilizing the additional ET Offset fields listed above to create logical relationships between the various elements within the handle.
  • Figure 10 illustrates the use of this structure 1010 to represent a hierarchical tree 1020.
  • the ET Complex structure defined above is sufficiently general, however, that virtually any collection metaphor can be represented by it including (but not limited to) arrays (multi-dimensional), stacks, rings, queues, sets, n-trees, binary trees, linked lists etc.
  • the 'moveTo', 'moveFrom' and 'nextltem' fields of the header have been omitted for clarity.
  • the 'valueR' field would contain a relative reference to the actual value associated with the tree node (if present), which would be contained in a record of type ET_S implex.
  • the type ID of this record would be specified in the 'typelD' field of the ET_Complex and, assuming the existence of an infrastructure for converting type IDs to a corresponding type and field arrangement, this could be used to examine the contents of the value (which could further contain ET_Offset fields as well).
  • 'A' 1025 has only one child (namely 'B' 1030), both the 'childHdr' 1035 and 'childTail' 1040 fields reference 'B' 1030, this is in contrast to the 'childHdr' 1045 and 'childTail' 1070 fields of 'B' 1030 itself which reflect the fact that 'B' 1030 has three children 1050, 1055, 1060.
  • the doubly-linked 'nextltem' and 'prevltem' fields are used.
  • the 'parent' field from the standard header is used to represent the hierarchy.
  • ET_Complex type is 'known' to the wrapper layer, it can transparently handle all the manipulations to the ET_Offset fields in order to ensure referential integrity is maintained during all such operations. This ability is critical to situations where large collections of disparate data must be accessed and distributed (while maintaining 'flatness') throughout a system.
  • Figure 11 illustrates the process for using the memory model to "sort” various structures.
  • a sample structure named ETjString 1100, could be defined in the following manner (defined below) to perform sorting on variable sized stractures: typedef struct ET String // String Structure
  • the 'nextString' fields 1110 ⁇ 1115, 1120, 1125 essentially track the 'nextltem' field in the header, indeed 'un-sort' can be trivially implemented by taking account of this fact.
  • index i.e., by following the 'nextString' field
  • users of such a 'string list' abstraction can manipulate collections of variable sized strings.
  • a complete and generalized string list manipulation package is relatively easy to implement.
  • the initial 'Start' reference 1130 in such a list must obviously come from a distinct record, normally the first record in the handle.
  • a distinct record normally the first record in the handle.
  • the specific implementation of these 'start' records are not important. What is important, however, is that each record type contain a number of ET_Offset fields that can be used as references or 'anchors' into whatever logical collection(s) is represented by the other records within the handle.
  • the deleted record When being deleted, the deleted record is generally 'orphaned'.
  • a record may be set to a defined record type, such as 'kOrphanRecord'. This record type could be used during compression operations to identify those records that have been deleted.
  • a record could also be identified as deleted by confirming that it is no longer referenced from any other stracture within the handle. Given the complete knowledge that the wrapper layer has of the various fields of the stractures within the handle, this condition can be checked with relative ease and forms a valuable double-check when particularly sensitive data is being deleted.
  • header stractures should also not be limited to the embodiments described. While the defined header stractures provide examples of the stractures that may be used, the plurality of header structures that could in fact be implemented is nearly limitless. Indeed, it is the very flexibility afforded by the memory management system that serves as its greatest strength.
  • the programming language compiler itself performs the job of defining data structures and the types and the fields that make them up. That type information is compile- time determined.
  • This approach has the advantage of allowing the compiler itself to detect many common programmer errors in accessing compound data structures rather than allowing such errors to occur at run-time where they are much harder to find.
  • this approach is completely inadequate to the needs of a distributed and evolving system since it is impossible to ensure that the code for all nodes on the system has been compiled with a compatible set of type definitions and will therefore operate correctly.
  • the problem is aggravated when systems from different vendors wish to exchange data and information since their type definitions are bound to be different and thus the compiler can give no help in the exchange.
  • APPENDIX 2 manipulate typed binary data at run-time.
  • this type information will be held in a 'flat' (i.e., easily transmitted) form and ideally is capable of being embedded in the data itself without impact on data integrity.
  • the system would also ideally make use of the power of compiled strongly typed programming languages (such as C) to define arbitrarily interrelated and complex structures, while preserving the ability to use this descriptive power at run-time to interpret and create new types.
  • the present invention provides a strongly-typed, distributed, run-time system capable of describing and manipulating arbitrarily complex, non-flat, binary data derived from type descriptions in a standard (or slightly extended) programming language, including handling of type inheritance.
  • the invention comprises four main components. First, a plurality of databases having binary type and field descriptions.
  • the flat data-model technology (hereinafter "Claimed Database") described in Appendix 1 is the preferred model for storing such information because it is capable of providing a 'flat' (i.e., single memory allocation) representation of an inherently complex and hierarchical (i.e., including type inheritance) type and field set.
  • a run-time modifiable type compiler that is capable of generating type databases either via explicit API calls or by compilation of unmodified header files or individual type definitions in a standard programming language. This function is preferably provided by the parsing technology disclosed in Appendix 2 (hereinafter "Claimed Parser").
  • a sample API suite is provided below.
  • a hashing process for converting type names to unique type IDs (which may also incorporate a number of logical flags relating to the nature of the type). A sample hashing scheme is further described below.
  • the system of the present invention is a pre-requisite for efficient, flexible, and adaptive distributed information systems.
  • Figure 1 provides a sample implementation of the data structure ETJField
  • Figure 2 provides a sample code implementation of the data structure ETJType
  • Figure 3 is a block diagram illustrating a sample type definition tree relating ETJType and ET_Field data structures.
  • Figure 4 provides a sample embodiment of the logical flags that may be used to describe the typelD.
  • ETJField' structure which is used to describe the fields of a given type
  • 'ETJType' structure which is used to described the type itself. Referring now to Figure 1, a sample implementation of the ETJField structure 100 is provided.
  • the fields in the ETJField structure are defined and used as follows:
  • typelD 104 - This field, and the union that surrounds it, contain a unique 64-bit type ID that will be utilized to rapidly identify the type of any data item. The method for computing this type ID is discussed in detail below.
  • fieldLink 110 This field contains a relative reference to the next field of the current type. Fields are thus organized into a link list that starts from the "fieldHDR" 220 field 220 of the type and passes through successive "fieldLink” 110 links 110 until there are no more fields.
  • Offset 112 This field contains the byte offset from the start of the parent type at which the field starts. This offset provides rapid access to field values at run-time.
  • unitID 114 - This field contains the unique unit ID of the field. Many fields have units (e.g., miles-per-hour) and knowledge of the units for a given field is essential when using or comparing field values.
  • bounds2 118 - For two dimensional arrays, this field contains the second dimension.
  • This invention is particularly well-adapted for structures of a higher dimensionality than two, or where the connections between elements of a structure is more complex that simple array indexing.
  • fScript 120 Arbitrary and pre-defined actions, functions, and scripts may be associated with any field of a type. These 'scripts' are held in a formatted character string referenced via a relative reference from this field.
  • field index is basically a count of the field occurrence index within the parent type and serves this purpose.
  • ETJType structure 200 The fields of the ETJType structure 200 are defined and used as follows:
  • hdr 202 - This is a standard header record of type ETJHdr as defined in the Claimed Database patent application.
  • typelD 204 - This field, and the union that surrounds it, contain a unique 64-bit type ID that will be utilized to rapidly identify the type of any data item. The method for computing this type ID is discussed in detail below.
  • cTypedef ' 216 - This field may optionally contain a relative reference to a string giving the C language type definition from which the type was created.
  • ChildHdr 218 - This field contains the header to the list of child types at any level .
  • fieldHDR 220 - Fields are organized into a link list that starts from the this field.
  • keyboards 222 - This field contains a relative reference to a string contain key words by which the type can be looked up.
  • filelndex 232 - used to identify the source file from which the type was created.
  • keyTypelD 234 - This field is used to indicate whether this type is designated a "key” type. In a full data-flow based system, certain types are designated 'key' types and may have servers associated with them.
  • the fields involved are "parentID” 240, "fieldHDR” 220, and "fieldLink” 110. It is thus very obvious how one would navigate through the hierarchy in order to discover say all the fields of a given type. For example, the following sample pseudo code illustrates use of recursion to first process all inherited fields before processing those unique to the type itself.
  • API Applications Programming Interface
  • the routine TM_CruiseTypeHierarchyO recursively iterates through all the subtypes contained in a root type, call out to the provided callback for each type in the hierarchy. In the preferred embodiment, if the function 'callbackFunc' returns -1, this routine omits calling for any of that types sub-types.
  • the routine TM_Code2TypeDB0 takes a type DB code (or TypelD value) and converts it to a handle to the types database to which it corresponds (if any).
  • the type system of this invention allows for multiple related type databases (as described below) and this routine determines which database a given type is defined in.
  • Each type DB is simply a single memory allocation utilizing a 'flat' memory model (such as the system disclosed in the Claimed Database patent application) containing primarily records of ETJType 100 and ETJField 200 defining a set of types and their inter-relationships.
  • TM_SaveATypeDB0 saves a types database to a file from which it can be re-loaded for later use.
  • TM_AlignedCopyO copies data from a packed structure in which no alignment rules are applied to a normal output structure of the same type for which the alignment rules do apply. These non-aligned stractures may occur when reading from files using the type manager.
  • Different machine architectures and compilers pack data into structures with different rules regarding the 'padding' inserted between fields. As a result, these data structures may not align on convenient boundaries for the underlying processor. For this reason, this function is used to handle these differences when passing data between dissimilar machine architecture.
  • TM_FixByteOrdering0 corrects the byte ordering of a given type from the byte ordering of a 'source' machine to that of a 'target' machine (normally 0 for the current machine architecture). This capability is often necessary when reading or writing data from/to files originating from another computer system. Common byte orderings supported are as follows:
  • TMJFindTypeDBO can be used to find the TypeDB handle that contains the definition of the type name specified (if any).
  • There are multiple type DBs in the system which are accessed such that user typeDBs are consulted first, followed by system type DBs.
  • the type DBs are accessed in the reverse order to that in which they were defined. This means that it is possible to override the definition of an existing type by defining a new one in a later types DB.
  • the containing typeDB can be deduced from the type ID alone (which contains an embedded DB index), however, in cases where only the name is known, this function deduces the corresponding DB.
  • This routine returns the handle to containing type DB or NULL if not found.
  • This invention allows for a number of distinct type DBs to co-exist so that types coming from different sources or relating to different functional areas may be self contained.
  • these type DBs are identified by the letters of the alphabet ('A' to 'Z') yielding a maximum of 26 fixed type databases.
  • temporary type databases (any number) can be defined and accessed from within a given process context and used to hold local or temporary types that are unique to that context. All type DBs are connected together via a linked list and types from any later database may reference or derive from types in an earlier database (the converse is not true). Certain of these type DBs may be pre-defined to have specialized meanings. A preferred list of type DBs that have specialized meanings as follows:
  • TM_GetTypeID0 retrieves a type's ID Number when given its name. If aTypeName is valid, the type ID is returned, otherwise 0 is returned and an error is reported. TM_IsKnownTypeNameO is almost identical but does not report an error if the specified type name cannot be found.
  • TM_ComputeTypeBaseIDO computes the 32-bit unique type base ID for a given type name, returning it in the most significant 32-bit word of a 64-bit ETJTypelD 104.
  • the base ID is calculated by hashing the type name and should thus be unique to all practical purposes.
  • the full typelD is a 64-bit quantity where the base ID as calculated by this routine forms the most significant 32 bits while a variety of logical flags describing the type occupy the least significant 32-bits.
  • the hash function chosen in the preferred embodiment is the 32-bit CRC used as the frame check sequence in ADCCP (ANSI X3.66, also known as FIPS PUB 71 and FED-STD-1003, the U.S. versions of CCITT's X.25 link- level protocol) but with the bit order reversed.
  • the FIPS PUB 78 states that the 32-bit FCS reduces hash collisions by a factor of 10 ⁇ -5 over the 16-bit FCS. Any other suitable hashing scheme, however, could be used. The approach allows type names to be rapidly and uniquely converted to the corresponding type ID by the system.
  • type information is to be reliably shared across a network by different machines.
  • a unique numeric type ID can be formed which can then be efficiently used to access information about the type, its fields, and its ancestry.
  • the other 32 bits of a complete 64-bit type ID are utilized to contain logical flags concerning the exact nature of the type and are provided in Appendix A.
  • kUniversalType 405 the set of direct descendants includes kVoidType 410, kScalarType 415, kStractType 420, kUnionType 425, and kFunctionType 430.
  • kScalarType also includes descendants for handling integers 435, descendants for handling real numbers 440 and descendants for handling special case scalar values 445. Again, this illustrates only one embodiment of built-in types that may be utilized by the present system.
  • TM_CIeanFieldNameO provides a standardized way of converting field names within a type into human readable labels that can be displayed in a Ul. By choosing suitable field names for types, the system can create "human readable” labels in the corresponding Ul.
  • the conversion algorithm can be implemented as follows:
  • TM_AbbreveFieldNameO could be used to provide a standardized way of converting field names within a type into abbreviated forms that are still (mostly) recognizable. Again, choosing suitable field names for types ensures both human readable labels in the corresponding Ul as well as readable abbreviations for other purposes (such as generating database table names in an external relational database system).
  • the conversion algorithm is as follows:
  • timeOfDay would become “TiOfDa” as would “time of day” if 'numLowerCase' was 1, it would be 'TimOfDay' if it were 2
  • Wrapper functions such as TMJSetTypeEditO, TMjSetTypeDisplayO, TM_SetTypeConverterO, TM_SetTypeCtypedefO, TM_SetTypeKeyWordsO,TM_SetTypeDescriptionO , and TM_SetTypeColor(), may be used set the corresponding field of the ETJType structure 200.
  • the corresponding 'get' functions are simply wrapper functions to get the same field.
  • a function, TMjSetTypelconO may be provided that sets the color icon ID associated with the type (if specified). It is often useful for Ul purposes to associate an identifiable icon with particular types (e.g., a type of occupation), this icon can be specified using TM SetTypelconO or as part of the normal acquisition process.
  • TM_GetTypeIconO returns the icons associated with a type (if any).
  • a function such as TM_SetTypeKeyTypeO, may be used to associate a key data type (see TM_GetTypeKeyType) with a type manager type. By making this association, it is possible to utilize the full suite of behaviors supported for external APIs such as Database and Client-Server APIs, including creation and communication with server(s) of that type, symbolic invocation, etc.
  • another routine such as TMJKeyTypeToTypelDOj may be used to obtain the type manager type ID corresponding to a given key data type. If there is no corresponding type ID, this routine returns zero.
  • TM_GetTypeNameO Another function, may be used to get a type's name given the type ID number. In the preferred embodiment, this function returns using the 'aTypeName' parameter, the name of the type.
  • a function such as TM FindTypesByKeywordO, may be used to search for all type DBs (available from the context in which it is called) to find types that contain the keywords specified in the 'aKeywordList' parameter. If matches are found, the function can allocate and return a handle to an array of type IDs in the 'thelDList' parameter and a count of the number of elements in this array as it's result. If the function result is zero, 'thelDList' is not allocated.
  • TM_GetTypeFileNameO gets the name of the header file in which a type was defined (if any).
  • TM_GetParentTypeIDO ? can be used to get the ID of the parent type. If the given ID has no parent, an ID of 0 will be returned. If an error occurrs, a value of -1 will be returned.
  • Another function, such as TM_IsTypeDescendantO may be used to determine if one type is the same as or a descendant of another. The TM_IsTypeDescendant call could be used to check only direct lineage whereas TM_jAreTypesCompatible checks lineage and other factors in determining compatibility. If the source is a descendant of, or the same as, the target, TRUE is returned, otherwise F.ALSE is returned.
  • TMJTypelsPointerO TMJTypelsHandleO
  • TMJTypelsRelRefO TMJTypelsCoIIectionRefO
  • TMJTypelsPersistentRefO s
  • the routines optionally return the typelD of the base type that is referenced if the type ID does represent a pointer/handle/ref.
  • TM_TypeIsPtr() when calling TM_TypeIsPtr(), a type ID that is a handle will return FALSE so the determination of whether the type is a handle, using a function such as TMJTypelsHandleO, could be checked first where both possibilities may occur.
  • TMJTypelsReferenceO will return true if the type is any kind of reference. This function could also return the particular reference type via a paramter, such as the 'refType' parameter.
  • TMJTypesAreCompatibleO Another function, such as TMJTypesAreCompatibleO, may be used to check if the source type is the same as, or a descendant of, the target type. In the preferred embodiment, this routine returns:
  • the source type is a 'grouping' type (e.g., Scalar), i.e., it has no size then this routine will return compatible if either the source is ancestral to the target or vice-versa. This allows for data flow connections that are typed using a group to be connected to flows that are more restricted.
  • a 'grouping' type e.g., Scalar
  • TM_GetTypeSizeO and TM SizeOfO
  • TM_GetTypeSize() could be provided with an optional data handle which may be used to determine the size of variable sized types (e.g., strings). Either the size of the type could be returned or, alternatively, a 0 could be returned for an error.
  • TM_SizeOf0 could be provided with a similar optional data pointer. It also could return the size of the type or 0 for an error.
  • TM_GetTypeBoundsO > could be programmed to return the array bounds of an array type. If the type is not an array type, this function could return a FALSE indicator instead.
  • the function TM_GetArrayTypeElementOffset0 can be used to access the individual elements of an array type. Note that this is distinct from accessing the elements an array field. If a type is an array type, the parent type is the type of the element of that array. This knowledge can be used to allow assignment or access to the array elements through the type manager API.
  • the function TM_InitMem initializes an existing block of memory for a type.
  • the memory will be set to zero except for any fields which have values which will be initialized to the appropriate default (either via annotation or script calls - not discussed herein).
  • the function TM_NewPtrO allocates and initializes a heap data pointer. If you wish to allocate a larger amount of memory than the type would imply, you may specify a non-zero value for the 'size' parameter. The value passed should be TM_GetTypeSize((7) + the extra memory required. If a type ends in a variable sized array parameter, this will be necessary in order to ensure the correct allocation.
  • the function TMJNewHdIO performs a similar function for a heap data handle.
  • the functions TMJDisposePtrO and TMJDisposeHdlO may be used to de-allocate memory allocated in this manner.
  • TMJLocalFieldPathO can be used to truncate a field path to that portion that lies within the specified enclosing type. Normally field paths would inherently satisfy this condition, however, there are situations where a field path implicitly follows a reference. This path truncation behavior is performed internally for most field related calls. This function should be used prior to such calls if the possibility of a non-local field path exists in order to avoid confusion. For example:
  • TM_GetFieldTypeIDO Given a type ID, and a field within that type, TM_GetFieldTypeIDO will return the type ID of the aforementioned field or 0 in the case of an error.
  • the function TM_GetBuiltInAncestor returns the first built-in direct (i.e., not via a reference) ancestor of the type ID given.
  • TM_GetIntegerVaIue and TM_GetReaIValueO Two functions, hereinafter called TM_GetIntegerVaIue and TM_GetReaIValueO, could be used to obtain integer and real values in a standardized form.
  • the TM GetlntegerValueO would return that value as the largest integer type (i.e., int64).
  • TM_GetRealValue() would return that value the largest real type (i.e., long double). This is useful when code does not want to be concerned with the actual integer or real variant used by the type or field.
  • Additional functions such as TMjSetlntegerValueO and TMJSetRealValueO, could perform the same function in the opposite direction.
  • TM_GetFieldContainerTypeH a function, hereinafter called TM_GetFieldContainerTypeH)0, could be used to return the container type ID of the aforementioned field or 0 in the case of an error.
  • the container type ID of a field is identical to 'aTypelD', however, in the case where a type inherits fields from other ancestral types, the field specified may actually be contributed by one of those ancestors and in this case, the type ID returned will be some ancestor of 'aTypelD'.
  • TM_GetFieldSize returns the size, in bytes, of a field, given the field name and the field's enclosing type; 0 is returned if unsuccessful.
  • TM_IsLegalFieldPath determines if a string could be a legal field path, i.e., does not contain any characters that could not be part of a field path. This check does not mean that the path actually is valid for a given type, simply that it could be. This function operates by rejecting any string that contains characters that are not either alphanumeric or in the set '[',']7J, or '.'. Spaces are allowed only between '[' and ']'.
  • TM_GetFieIdValueH a function, hereinafter known as TM_GetFieIdValueH , could be used to copy the field data referenced by the handle into a new handle. In the preferred embodiment, it will return the handle storing the copy of the field data. If the field is an array of 'char', this call would append a terminating null byte. That is if a field is "char[4]" then at least a 5 byte buffer must be allocated in order to hold the result. This approach greatly simplifies C string handling since returned strings are guaranteed to be properly terminated.
  • a function, such as TM_GetFieldVaIueP ? could serve as the pointer based equivalent. Additionally, a function such as TM_SetFieldValueO could be used to set a field value given a type ID, a field name and a binary object. It would also return an error code in an error.
  • a function such as TMjSetCStringFieldValueO, could be used to set the C string field of a field within the specified type. This function could transparently handle logic for the various allowable C-string fields as follows:
  • a function such as TM_AssignToFieldO, could be used to assign a simple field to a value expressed as a C string.
  • the target field could be:
  • the assignment logic used by this routine would result in existing string fields having new values appended to the end of them rather than being overwritten. This is in contrast to the behavior of TM_SetCStringFieldValue() described above.
  • any values specified overwrite the previous field content with the exception of assignment to the 'aStringH' field of a collection or persistent reference with is appended if the 'kAppendStringValue' option is present. If the field being assigned is a collection reference and the 'kAppendStringValue' option is set, the contents of 'aStringPtr' could be appended to the contents of a string field.
  • the 'kAssignToRefType','kAssignToUniqueID' or 'kAssignToStringH' would be used to determine if the typelD, unique ID, or 'aStringH' field of the reference is assigned. Otherwise the assignment is to the name field.
  • the string could be assumed to be a valid type name which is first converted to a type ID. If the field is a relative reference (assumed to be to a string), the contents of 'aStringPfr' could be assigned to it as a (internally allocated) heap pointer.
  • TM_SetArrFieldValue could be used to copy the data referenced by the pointer into an element of an array field element into the buffer supplied.
  • Array fields may have one, or two dimensions.
  • TM_GetCStringFieIdValueB » TM_GetCStringFieldValuePO and TM_GetCStringFieIdValueHO could be used to get a C string field from a type into a buffer/pointer/handle.
  • the buffer supplied must be large enough to contain the field contents returned.
  • the function or program making the call must dispose of the memory returned when no longer required.
  • this function will return any string field contents regardless of how is actually stored in the type structure, that is the field value may be in an array, via a pointer, or via a handle, it will be returned in the memory supplied. If the field type is not appropriate for a C string, this function could optionally return FALSE and provide an empty output buffer.
  • TM_GetArrFieldVaIueP a function that will copy an element of an array field element's data referenced by the pointer into the buffer supplied.
  • Array fields may have one, or two dimensions.
  • TM GetFieldBoundsO TM_GetFieIdOffset0
  • TM_GetFieldUnitsO TM_GetFieIdDescription()
  • Corresponding 'set' functions (which are similar) could also be provided.
  • TM ForAHFieldsLoopO is also provided that will iterate through all fields (and sub-fields) of a type invoking the specified procedure. This behavior is commonplace in a number of situations involving scanning the fields of a type. In the preferred embodiment, the scanning process should adhere to a common approach and as a result a function, such as this one, should be used for that purpose.
  • a field action function takes the following form:
  • Type DBHdl aTypeDBHdl, // 1: Type DB (NULL to default)
  • ETJTypelD 104 aContainingTypelD // 1: containing Type ID of field anonPtr aDataPtr, // 1: The type data pointer anonPtr context, // IO:Use to pass custom context charPtr fieldPath, // LField path for field
  • ETJTypelD 104 aFieldTypelD, // I:Type ID for field int32 dimensionl, // LField array bounds 1 (0 if
  • fields are processed in the order they occur, sub-field calls (if appropriate) occur after the containing field call. If this function encounters an array field (1 or 2 dimensional), it behaves as follows:
  • the action function is first called once for the entire field with no field indexing specified in the path.
  • the action function will be invoked recursively for each element with the appropriate element index(es) reflected in the 'fieldPath' parameter, the appropriate element specific value in 'fieldOffset', and 0 for both dimensionl and dimension2.
  • the 'aDataPtr' is the address of an ET_ViewRef designating a collection element
  • TM_FieldNameExistsO A function, hereinafter referred to as TM_FieldNameExistsO, could be used to determine if a field with the given name is in the given type, or any of the type's ancestral types. If the field is found return it returns TRUE, otherwise it returns F.ALSE.
  • TM_GetNumberOfFields0 5 may be used to return the number of fields in a given structured type or a -1 in the case of an error. In the preferred embodiment, this number is the number of direct fields within the type, if the type contains sub-structures, the fields of these sub-structures are not counted towards the total returned by this function.
  • TM_ForAllFieldsLoop() to count fields regardless of level with 'kRecursiveLoop' set true and a counting function passed for 'aFieldFn' (see TM_GetTypeMaxFlagIndex).
  • TM_GetFieIdFIagIndexO Another function, referred to as TM_GetFieIdFIagIndexO, can provide the 'flag index' for a given field within a type.
  • the flag index of a field is defined to be that field's index in the series of calls that are made by the function TM_ForAllFieldsLoop() (described above) before it encounters the exact path specified.
  • This index can be utilized as an index into some means of storing information or flags specific to that field within the type.
  • these indeces include any field or type arrays that may be within the type.
  • This function may also be used internally by a number of collection flag based APIs but may also be used by external code for similar purposes.
  • the index may be somewhat larger than the count of the 'elementary' fields within the type. Additionally, because field flag indeces can be easily converted to/from the corresponding field path (see TMJFlaglndexToFieldPath), they may be a useful way of referring to a specific field in a variety of circumstances that would make maintaining the field path more cumbersome.
  • TM_FieldOffsetToFlagIndex0 is a function that converts a field offset to the corresponding flag index within a type
  • TMJFlaglndexToFieldPathO is a function that converts a flag index to the corresponding field path within a type
  • TM_GetTypeMaxFlagIndexO returns the maximum possible value that will be returned by TM_GetFieldFlagIndex() for a given type. This can be used for example to allocate memory for flag storage.
  • Another function referred to as TM FieldNamesToIndeeesO, converts a comma seperated list of field names/paths to the corresponding zero terminated list of field indeces. It is often the case that the 'fieldNames' list references fields within the structure that is actually referenced from a field within the structure identified by 'aTypelD'. In this case, the index recorded in the index list will be of the referencing field, the remainer of the path is ignored. For this reason, it is possible that duplicate field indeces might be implied by the list of 'fieldNames' and as a result, this routine can also be programmed to automatically eliminate duplicates.
  • TM_GetTypeProxy A function, hereinafter name TM_GetTypeProxy , could be used to obtain a proxy type that can be used within collections in place of the full persistent type record and which contains a limited subset of the fields of the original type. While TM_GetTypeProxy() could take a list of field indeces, the function TMJMakeTypeProxyFromFieldsO could be used to take a comma separated field list. Otherwise, both functions would be identical. Proxy types are all descendant of the type ETJHit and thus the first few fields are identical to those of ET Hit. By using these fields, it is possible to determine the original persistent value to which the proxy refers.
  • proxy types are formed and used dynamically. This approach provides a key advantage of the type system of this invention and is crucial to efficient operation of complex distributed systems. Proxy types are temporary, that is, although they become known tliroughout the application as soon as they are defined using this function, they exist only for the duration of a given run of the application. Preferably, proxy types are actually created into type database 'E' which is reserved for that purpose (see above). Multiple proxys may also be defined for the same type having different index lists.
  • proxy type names are of the form:
  • TMJMakeTypeProxyFromFilterO Another function that may be provided as part of the API, hereinafter called TMJMakeTypeProxyFromFilterO
  • TMJMakeTypeProxyFromFilterO can be used to make a proxy type that can be used within collections in place of the full persistent type record and which contains a limited subset of the fields of the original type.
  • the fields contained in the proxy are those allowed by the filter function, which examines ALL fields of the full type and returns TRUE to include the field in the proxy or FALSE to exclude the field.
  • TMJV ⁇ akeTypeProxyFrornFieldsO The only difference between this function and the function TM_MakeTypeProxyFromFields() is that TM_MakeTypeProxyFromFields() expects a commma separated field list as a parameter instead of a filter function.
  • Another function, TM_IsTypeProxyO could be used to determine if a given type is a proxy type and if so, what original persistent type it is a proxy for. Note that proxy type values start with the fields of ET Hit and so both the unique ID and the type ID being referenced may be obtained more accurately from the value. The type ID returned by this function may be ancestral to the actual type ID contained within the proxy value itself.
  • ETJHit may be used to return data item lists from servers in a form that allows them to be uniquely identified (via the _system and _id fields) so that the full (or proxy) value can be obtained from the server later.
  • ET Hit is defined as follows:
  • OSType _system // system tag unslnt64 _id; // local unique item ID
  • ETJTypelD 104 _type // type ID int32 relevance; // relevance value 0..100
  • TM_GetNthFieIdTypeO gets the type of the Nth field in a structure.
  • TM_GetNthFieldNameO obtains the corresponding field name, and TM_GetNthFieIdOffset0 the corresponding field offset.
  • Th s function produces a list of type IDs of the children of the given type. This function allocates a zero terminated array of ETJTypelD 104's and returns the address of the array in 'aChildlDList'; the type ID's are written into this array. If 'aChildlDList' is specified as NULL then this array is not allocated and the function merely counts the number of children; otherwise 'aChildlDList' must be the address of a pointer that will point at the typelD array on exit. A negative number is returned in the case of an error. In the preferred embodiment, various specialized options for omitting certain classes of child types are supported.
  • TM_GetTypeAncestors ? may also be provided that produces a list of type IDs of ancestors of the given type. This function allocates a zero terminated array of ETJTypelD 104 and returns the address of the array in 'ancesfrallDs 1 ; the type ID's are written into this array. If 'ancesfrallDs' is specified as NULL then this array is not allocated and the function merely counts the number of ancestors; otherwise 'ancesfrallDs' must be the address of a pointer that will point at the typelD array on exit.
  • the last item in the list is a 0, the penultimate item is the primal ancestor of the given type, and the first item in the list is the immediate predecessor, or parent, of the given type.
  • the function TM_GetTypeAncestorPath produces a ':' seperated type path from a given ancestor to a descendant type. The path returned is exclusive of the type name but inclusive of the descendant, empty if the two are the same or 'ancestorlD' is not an ancestor or 'aTypelD'.
  • the function TM_GetInheritanceChainO is very similiar to TM_GetTypeAncestors() with the following exceptions:
  • this function allocates a zero terminated array of ETJTypelD 104's and returns the address of the array in 'inheritanceChainlDs'; the type ID's are written into this array. If 'inheritanceChainlDs' is specified as NULL then this array is not allocated and the function merely counts the number of types in the inheritance chain; otherwise 'inheritanceChainlDs' must be the address of a pointer that will point at the typelD array on exit. The last item in the list is 0, element 0 is the primal ancestor of the base type, and the next to last item in the list is the base type.
  • the API could also include a function, hereinafter called TM_GetTypeDescendantsO, that is able to create a free collection whose root node is the type specified and whose branch and leaf nodes are the descendant types of the root. Each node in the tree is named by the type name and none of the nodes contain any data. Collections of derived types can serve as useful frameworks onto which various instances of that type can be 'hung' or alternatively as a navigation and/or browsing framework. The resultant collection can be walked using the collections API (discussed in a later patent).
  • the function TM_GetTypeSiblingsO produces a list of type IDs of sibling types of the given type.
  • This function allocates a zero terminated array of ETJTypelD 104's and returns the address of the array in 'aListOSibs', the type ID's are written into this array. If 'aListOSibs' is specified as NULL then this array is not allocated and the function merely counts the number of siblings; otherwise 'ancesfrallDs' must be the address of a pointer that will point at the typelD array on exit. The type whose siblings we wish to find is NOT included in the returned list.
  • the function TM_GetNthChiIdTypeIDO gets the n'th child Type ID for the passed in parent. The function returns 0 if successful, otherwise it returns an error code.
  • TMJBinaryToStringO converts the contents of a typed binary value into a C string containing one field per delimited section. During conversion, each field in turn is converted to the equivalent ASCII string and appended to the entire string with the specified delimiter sequence. If no delimiter is specified, a new-line character is used. The handle, 'aStringHdl', need not be empty on entry to this routine in which case the output of this routine is appended to whatever is already in the handle. If the type contains a variable sized array as its last field (i.e., stufffj), it is important that 'aDataPtr' be a true heap allocated pointer since the pointer size itself will be used to determine the actual dimensions of the array. In the preferred embodiment, the following specialized options are also available:
  • TMjStringToBinaryO ? may also be provided in order to convert the contents of a C string of the format created by TM_BinaryToString into the equivalent binary value in memory.
  • the API may also support calls to a function, hereinafter referred to as TMJLowestCommonAncestorO, which obtains the lowest common ancestor type ID for the two type IDs specified. If either type ID is zero, the other type ID is returned. In the event that one type is ancestral to the other, it is most efficient to pass it as the 'typeID2' parameter.
  • TMJLowestCommonAncestorO a function that obtains the lowest common ancestor type ID for the two type IDs specified. If either type ID is zero, the other type ID is returned. In the event that one type is ancestral to the other, it is most efficient to pass it as the 'typeID2' parameter.
  • TM Def ⁇ neNewTypeO a function, referred to as TM Def ⁇ neNewTypeO, is disclosed that may be used to define a new type to be added to the specified types database by parsing the C type definition supplied in the string parameter.
  • the C syntax typedef string is preserved in its entirety and attached to the type definition created so that it may be subsequently recalled. If no parent type ID is supplied, the newly created type is descended directly from the appropriate group type (e.g., structure, integer, real, union etc.) the typedef supplied must specify the entire stracture of the type (i.e., all fields).
  • script used to associate a script with a type or field
  • annotation used to associate an annotation with a type or field @ — relative reference designator (like '*' for a pointer)
  • a 'resolver' function and at least one plug-in are provided.
  • a pseudo code embodiment of one possible resolver is set forth in Appendix A. Since most of the necessary C language operations are already provided by the built-in parser plug-in zero, the only extention of this solution necessary for this application is the plug-in functionality unique to the type parsing problem itself. This will be referred to as plug-in one and the pseudo code for such a plug in is also provided in Appendix A.
  • ET_ViewHdl aView // I: locked view handle ET_WidgetPtr force idget // I: idget to force, or
  • ⁇ wid forceWidget if ( i//id ) // forced pick of a widget
  • SC_ScheduleANode (aView, id) ; // give focus widget 1/2 the ' slot 3
  • SC_SetCurrentWidget ( 0 , wid) ; if ( SC_ScheduleANode (aView,wid) ) break;
  • SC_SetCurrentWidget (aView, wid) ; if ( flags & klsRunning ) // and it's running ?
  • SC_SetCurrentWidget (aView,aWidP) ; rotate cIpinList of flow to ensure no pin always gets to go first rotate token list for aWidP if necessary return;
  • runnit YES; // if not "as needed” then run if ( runnit && ! justCheckin ) // start this one for real so... '
  • SC_StartCwidget (aView,aWidP) ; // tokens to internal flows
  • NULL char pin, II I output pin A-Z, a-z select
  • ETJTypelD aTypelD II I The type ID to set it to
  • NULL char pin II I input pin A-Z, a-z select
  • NULL char pin II I input pin A-Z, a-z select
  • NULL char pin II I output pin A-Z, a-z select
  • NULL char pin II I r output pin A-Z, a-z select void *data, II I pointer to data to write long size II I size in bytes of data

Abstract

System and method for implementing a data-flow based system. The system includes three basic components: a data-flow based scheduling environment that balances the needs of data initiated program execution as a result of flows with other practical considerations such as user responsiveness, event driven invocation, user interface considerations, and the need to also support control-flow based paradigms where required; a visual programming language, based on the flow of strongly-typed run-time accessible data and data collections between small control-flow based locally and network distributed functional building blocks, known as widgets; and a formalized pin based interface to allow access to data-flow contents from the executing code within the widgets. The pins on the widgets include both pins used to control execution of a widget as well as pins used to receive data input from a data flow.

Description

A SYSTEM AND METHOD FOR MANAGING DATAFLOWS
BACKGROUND OF THE INVENTION
For complex systems, such as those designed for multimedia intelligence and knowledge management applications, the current 'control flow' based design methods are totally unsuitable. Once a system is broadened to include acquisition of unstructured, non-tagged, time-variant, multimedia information (much of which is designed specifically to prevent easy capture and normalization by non-recipient systems), a totally different approach is required. In this arena, many entrenched notions of information science and database methodology must be discarded to permit the problem to be addressed. We shall call systems that attempt to address this level of problem, 'Unconstrained Systems' (UCS). An unconstrained system is one in which the source(s) of data have no explicit or implicit knowledge of, or interest in, facilitating the capture and subsequent processing of that data by the system. The most significant challenges that must be resolved with the UCS is based on the following realities:
a) Change is the norm. The incoming data formats and content will change. The needs and requirements of the users of the data will also change. This will be reflected not only in their demands of the Ul to the system, but also in the data model and field set that is to be captured and stored by the system.
b) An unconstrained system usually only samples from the flow going through the information pipe. The UCS is neither the source nor the destination for that flow, but simply a monitoring station attached to the pipe capable of selectively extracting data from the pipe as it passes by.
c) In a truly unconstrained system, the information can only be monitored and the system may react to it — it cannot be controlled.
This loss of control over data is one of the most difficult challenges in the prior art. The prior art clearly suggests that software consists of a 'controlling' program that takes in inputs, performs certain predefined computations, and produces outputs. Nearly every installed system in the prior art complies with this approach. Yet it is obvious from the discussion above that this model can only hold true on a very localized level in a UCS. The flow of data through the system is really in control. It is illustrative to note that the only example of a truly massive software environment is the Internet itself. This success was achieved by defining a rigid set of protocols (IP, HTML etc.) and then allowing Darwinian-like and unplanned development of autonomous but compliant systems to develop on top of the substrate. A similar approach is required in the design of unconstrained systems.
In the traditional programming world, a programmer would begin by defining certain key algorithms and then identify all of the key inputs into the system. As such, the person or entity supplying the data is often asked to comply with very specific data input requirements impacting the format, length, field definitions, etc. The problem with this approach, however, is that predicting needed algorithms or approaches that are appropriate to solving the problem of 'understanding the world' is simply too complex. Once again, the conventional approach of defining processing and interface requirements, and then breaking down the problem into successively smaller and smaller sub-problems becomes unworkable. The most basic change that must be made, then, is to create an environment that operates according to data-flow rules, not those of a classic control-flow based system.
In spite of the prevalence of control based programming frameworks, various data-flow based software design and documentation techniques have been in usage for many years. In these techniques, the system design is broken into a number of distinct processes and the data that flows between them. This breakdown closely matches the perceptions of the actual system users/customers and thus is effective in communicating the architecture and requirements. Unfortunately, due to the lack of any suitable data-flow based substrate, even software designs created in this manner are invariably translated back into control-flow methods, or at best to message passing schemes, at implementation time. This translation begins a slippery slope that results in such software being of limited scope and largely inflexible to changes in the nature of the flow. This problem is at the root of why software systems are so expensive to create and maintain.
At the most fundamental operating system scheduling level, we need an environment where the presence of suitable data initiates program execution, not the other way round. More specifically, what is needed is a substrate through which data can flow and within which localized areas of control flow can be triggered by the presence of certain data. Additionally, such a system would ideally facilitate easy incoφoration of new plug-in control flow based functions or routines and their interface to data flowing through the data-flow based substrate so that it will be possible for the system to 'evolve'. In essence, the users, knowingly or otherwise, must teach the system how they do what they do as a side effect of expressing their needs to it. No two analysts will agree completely on the meaning of a set of data, nor will they concur on the correct approach to extracting meaning from data in the first place. Because all such perspectives and techniques may have merit, the system must allow all to co-exist side by side, and to contribute, through a formalized substrate and protocol, to the meta-analysis that is the eventual system output.
SUMMARY OF INVENTION
The present system and method provide such a system. To implement a data-flow based system, three basic components must be created and integrated:
a) A data-flow based scheduling environment that balances the needs of data initiated program execution as a result of flows with other practical considerations such as user responsiveness, event driven invocation, user interface considerations, and the need to also support control-flow based paradigms where required.
b) A visual programming language, based on the flow of strongly-typed run-time accessible data and data collections between small control-flow based locally and network distributed functional building-blocks, known henceforth as widgets.
c) A formalized pin-based interface to allow access to data-flow contents from the executing code within the widgets.
The pins on the widgets include both pins used to control execution of a widget as well as pins used to receive data input from a data flow. The system and method further include a debugging environment that enables visual debugging of one or more widgets (or collections s widgets). Data control techniques include the concepts of "OR" and "AND" consumption thereby permitting either consumption immediately or only after all widget inputs have received the token. Additional extensions to this framework will also be described that relate to the environment, the programming language and the interface.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 illustrates an example of a conditional statement.
Figure 2 illustrates an example case statement using an atomic widget.
Figure 3 illustrates a sample embodiment of a Widget Editing Mode (WEM) window 300.
Figure 4 illustrates a full-featured icon-editor that allows alteration of the widget icon.
Figure 5 illustrates a sample embodiment of a file menu 415 of the WEM.
Figure 6 illustrates a sample Add menu 417 of the WEM.
Figure 7 illustrates a sample Align menu 418 of the WEM.
Figure 8 illustrates a sample Display menu of the WEM.
Figure 9 illustrates a sample setup menu 421.
Figure 10 illustrates a sample embodiment of the debug menu 422 of the WEM.
Figure 11 illustrates a sample Pin information dialog 1100.
Figure 12 illustrates a user in the process of choosing the type 1210 of a constant symbol in the WEM diagram within the type pop-up menu 1210 of the constant information window 1200.
Figure 13 illustrates a dialog window 1300 generated in connection with selection of the view or widget information window in the setup menu 421.
Figure 14 illustrates a simple calculator widget/view 1400.
Figure 15 illustrates the structural components of the calculator widget/view 1400.
Figure 16 illustrates an internal diagram of the calculator as it would appear in the preferred Widget Editing Mode window. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The system described herein may be used in conjunction with a number of other key technologies and concepts that represent the preferred embodiments of the present invention. These various building-block technologies have been previously described in the following patents attached hereto as Appendix 1, hereinafter referred to as "Memory Patent" and Appendix 2, hereinafter referred to as "Types Patent":
As set forth above, the system is preferably comprised of the following components:
The present system and method provide such a system. To implement a data-flow based system, three basic components must be created and integrated:
a) A data-flow based scheduling environment that balances the needs of data initiated program execution as a result of flows with other practical considerations such as user responsiveness, event driven invocation, user interface considerations, and the need to also support control-flow based paradigms where required.
b) A visual programming language, based on the flow of strongly-typed run-time accessible data and data collections between small control-flow based locally and network distributed functional building-blocks, known henceforth as widgets.
c) A formalized pin-based interface to allow access to data-flow contents from the executing code within the widgets.
The requirements for and implementation of each of these required components will be addressed in the sections that follow. All of the structures defined and used below (widgets, pins, flows, constants, etc.) are preferably implemented within the flat memory model described in the Memory Patent and are contained within a loadable and executable memory allocation known as a 'view'. Only complete and correct views can be 'run' by the data-flow scheduler. There may be any number of different views in the system, and any number of instances of a given view.
As an initial matter, it is helpful to describe the "building blocks" involved in the present invention. A 'widget' is the fundamental building block of the system. A widget contains certain functionality encapsulated along with a definition of the inputs and outputs necessary to interface to that functionality. An atomic widget contains compiled code that generally cannot be either examined or altered within the framework of the environment. A compound widget contains an inner structure that defines any subordinate widgets that are required to implement the required functionality, together with the data flows between these contained widgets. In general compound widgets can be opened, examined, and altered by system users. Compound widgets may themselves be combined with other widgets (both atomic and compound) to yield higher-level compound widgets, to any arbitrary level of nesting. At the uppermost level, widgets are combined into 'views' that may be thought of as complete mini-applications that preferably include all necessary Ul functionality.
It is the views, and the widgets that they contain, that are loaded into the environment at execution time. Thereafter, the widgets are scheduled and executed according to the control and data flows defined in the widgets themselves. Atomic widgets can be grouped into functionally related sets known as widget packs.
In the preferred embodiment, widget packs appear and are manipulated in the Widget Editing Mode (WEM) diagram as a single unit, but each of the members of the unit can be executed independently of the other members. The principal functional member of a widget pack (i.e., the 'do it' function) is known as the formal widget, all other widgets in the pack are degenerate (known as degenerate widgets). The pack metaphor is necessary to support asynchronous access to elements or attributes of the internal state of a logical functionality implemented by the pack. Without packs, data-flow is essentially a synchronous metaphor where widgets do not run until all necessary inputs have arrived. The support of 'exclusive' pins (described later) is another exception to this rule.
Compound and atomic widget inputs and outputs as displayed during WEM, are collectively referred to as pins. A formal pin is one that must be connected in order for the widget to operate correctly, a degenerate pin need only be connected if required in the particular use of the widget and may otherwise be left unconnected. Degenerate pins come in two varieties; those that assume a default value within the widget when unconnected (defaulted degenerate pins), and those that do not (un-defaulted degenerate pins).
A View has associated with it a specialized compound widget known as a view widget which contains a collection of atomic or compound widgets, each of which may have at most one user interface region known as a pane. These regions range.from buttons, windows, controls, etc. to arbitrarily complex closed shapes. In addition to the view widget, a view contains the layout information that specifies the arrangement of display panes within the enclosing window. The entire view is enclosed in a view window. The system is capable of accessing and transferring between large numbers of different views both under menu control, and by use of suitable view change widgets. Like widgets, views may be shared between users or may be unique to a particular user. Like other widgets, view widgets may have data flow inputs and outputs, but in the case of views, these are physically mediated by network events/messages that are sent to or received from other views, either in the same workstation or another node on the network. A dataflow environment built on this metaphor is thus transparently distributed.
It is possible to execute a widget without making connections to any degenerate inputs or outputs that a widget contains; in this case the default values (if specified) will be used for the inputs, and the output(s) will be discarded. If no default is defined for a degenerate input, then within that widget, no tokens will appear from that input pin and hence any widgets connected to that input cannot become eligible for scheduling. Degenerate widgets I/O pins and the defaults associated with them can be explicitly overridden by connecting the inputs to an appropriate source/sink of the type required. Default values can be read and edited as part of the widget editing process. The interface provides a semi-automated and convenient method of resolving type conflicts and inserting the appropriate type conversion widgets. Type conversion widgets generally have many degenerate inputs and outputs, each of which will interface to a particular type. The interface is able to recognize type conversion widgets for what they are (via a dedicated flag), and when a type conflict occurs, searches all available type converters for those that meet the necessary input and output criteria. When all suitable type converters have been identified, the user is able to select the most appropriate from a list of all converters that meet the criteria.
Widget data-flow inputs and outputs can be connected to other data-flow inputs and outputs (of a compatible type) in widget editing mode (WEM) in order to define the required widget functionality. For example, a single widget data output can be connected to multiple data-flow inputs. When a multiple input connection is made to a single output, the interface allows the user to choose whether the output is consumed by the first widget that has all inputs available including the input in question (OR consumption logic), or whether it is only consumed when all connected widgets have run (AND consumption logic). Conversely, multiple widget outputs can be connected to a single widget input, in which case the input accepts and consume each widget output as it becomes available. This situation occurs commonly in user control panels where a number of buttons effect the state of a single widget/display. It is possible (though uncommon) for multiple widget outputs or sources to be connected to multiple widget inputs or sinks. This capability may be important for widget mediated load sharing across multiple server processes, for example. Every widget has the potential to accept a single control flow input and to generate a single control flow output; these pins are degenerate (i.e., are ignored unless actually connected). In the preferred embodiment, control pins cannot have defaults associated with them. Like data-flow inputs and outputs, control-flow pins can be wired up to other control flow pins, but not to data flow pins (unless of Boolean type). Control flow wiring carries an implicit Boolean value indicating that the control flow criteria concerned has or has not been met. If the control flow condition has not been met, then control flow wiring carries the value false, and does not trigger any connected control flow inputs. If the condition has been met, the wiring carries a true value and triggers any connected control flow inputs. Unless explicitly altered within a widget definition, a widget's control flow output goes true immediately upon completion of execution of that widget, it goes false immediately after execution of the widget begins. If a widget's control flow input is connected, then execution of that widget cannot begin until the control flow signal to which it is connected is asserted. Normally, it is likely that compound widgets can be constructed entirely based on data flow programming and without the explicit use of control flow pins. However, there are a number of situations, especially those involving the synchronization of multiple server processes, which may require use of the control flow pins. The system also permits a tie between multiple control flow outputs and a given control flow input in which case the associated widget cannot begin execution until all data flow inputs are satisfied and, either the AND or the OR of all control inputs is asserted (depending on the type of control input used). Selection of either a control flow OR/AND for a widget control input is generally performed when connecting control flow signals. The system also supports connections between a single widget control flow output to multiple different control flow inputs. In this case, all widgets whose inputs are so connected cannot execute until the control flow output is asserted. Unlike data-flow connections, control flow signals are not 'consumed' by the receiving input pin, but remain asserted until source widget activity drives them false. This means that, in general, control flow signals can be multiply sourced and synced without the potential for confusion as to what will happen. In the preferred embodiment, all logical operations on the control flow signals are the responsibility of the engine/interface; this knowledge does not propagate into the widget itself. It is possible to connect a control flow signal or pin to any data flow signal of the system defined type Boolean; connection to any other data flow type is generally forbidden.
The degenerate widgets of a widget pack are capable of accepting and producing both formal and degenerate data flow I/O pins as well as the standard control flow pins. Individual members of a widget pack can be invoked independently of other members of the pack but all members of the pack share the same storage area; this storage area is allocated at the time the widget pack is instantiated (generally via the initialize entry point of the formal widget), and is passed by reference to each member of the pack as it is invoked by the engine. As with all other widget types, a degenerate widget of a widget pack only executes when all of its inputs become available. Degenerate widgets need not provide any entry points other than the 'execute1 entry point, the engine invokes the entry points associated with the formal widget of the pack when using entry points other than execute. All widgets of a widget pack are stored together in a single file and for the purposes of copying and other activities using the WEM menus are treated as a single unit. It is generally not possible to treat a degenerate widget of a pack as if it were a fully defined atomic widget within the normal WEM environment.
Within a pack, the various members can communicate with each other via the data area and can also directly invoke other members of the pack. As a result, it is valid for degenerate widgets of a pack to contain nothing but outputs which are presumably produced when the internal state of the pack meets certain criteria.
A View can be thought of as a mini application, whose functionality is defined by the widgets it contains and the data flows between them. A view's appearance is most easily defined by superimposing the display components of all widgets in the view on a background that is an image. Views provide the framework within which it becomes possible to instantiate and execute the various atomic and compound widgets. No widget can execute unless it is either explicitly or implicitly contained in a view. Views are preferably stored in view definition files which may be accessed and initiated via the environment's view menu. Each view definition file contains as a minimum the following components:
• A specialized compound widget (a view widget) associated with the view that defines the control and data flows between the widgets that make up the view
• Layout information describing the size of the view window, and the location, shape and size of all display and user interface components within that window
• an image that describes the background for the view.
Views may be in one of two states: active or inactive. An active view is one that is currently executing and has therefore loaded all contained widgets into the engine where they are currently executing. An inactive view contains no executing widgets and is not currently loaded into the widget engine. Every view has associated with it a window which may or may not be visible at any given time. For the purposes of this description, the view that is associated with the front window on the user's screen is known as the front view and only one view can be the front view at any given time. This would not necessarily be the case in alterative display environments that permit 2+ dimensional views, however. Unlike widgets, views are generally not nested within (in a visual sense) other views. A view is always the outermost component or container for a given user defined functionality and usually has no relation to the current screen position of any other view. Views also can be combined into groups called view packs and these views packs share a logical context much in the manner of widget packs.
As set forth above, a view has associated with it a compound widget defining the data and control flows between the display and functional widgets that go to make up the view. This compound widget is known as a view widget and is similar to any other compound widget. Because it is part of a view, however, its data flow I/O pins are connected to other views by means of network events. The majority of view widgets will have zero inputs and outputs. Certain specialized views, however, may be controlled from other views and such cases the controlling view will have data flow outputs while the controlled view will have corresponding data flow inputs. View outputs may also optionally include a target view and network node in order to route the event to the intended destination. If no such qualifiers are included, the event will be sent to any views in the local environment that contain inputs whose name and type exactly match that of the view output. If no such inputs exist, the data flow output is discarded. Unlike other widget types, a view widget is scheduled (or rescheduled) whenever any of its inputs becomes available. Internal scheduling of the view, however, may be suspended should other required inputs still be undefined.
Any component of a view widget may also have (one or more) panes associated with it. In such cases, the view causes a marquee or image of that pane to appear in the view layout window where it may be re-sized (within limits) and relocated as part of the view layout process. Panes are normally rectangular but it is possible to create and interact with panes that occupy any arbitrary closed region. A view may be comprised of many panes, each of which represents the display region of the widget responsible for interpreting or displaying the control/display that the pane relates to. For widgets whose appearance is fully determinable at layout time (e.g., named buttons), the final widget appearance is shown in the pane during view layout.
As described above, the WEM window provides the interface in which views and widgets may be edited, modified or displayed. For example, within the WEM window, the subordinate widgets and the data flow between them is displayed. In the preferred embodiment, colored lines that join the pins of widget icons/symbols to other pins in the diagram represent data flow. The color of the line can be used to convey type information. Wherever one or more lines in a WEM window is joined in terms of data or control flow, this is represented by a standard line junction symbol. By default, data-flow outputs are consumed when the widget associated with every connected input has been triggered. The user has the option to select that the output be consumed when the first widget that has a connected input is triggered. These two forms of signal consumption logic are referred to in this document as "OR consumption" (first triggered widget input consumes output) and "AND consumption" (output is only consumed when all widgets with triggered inputs have been run). Different forms of data flow output consumption logic may also be implemented by the scheduling engine. Control flow signals are never 'consumed'. They remain asserted until renewed widget activity causes them to go false. There is an implicit latch on every widget data input so that regardless of the consumption logic operating outside the widget, within the widget, the input may operate using either OR/AND Consumption, the default is AND Consumption. When multiple data-flow outputs are connected together to one or more data flow inputs, the same consumption logic applies to all connected widgets. During execution, a second output value will not be applied to the interconnect signal by the engine until any previous output has been consumed, thus forming an automatic queuing mechanism.
The representation of various standard programming constructs (such as the loop, switch, and conditional statement) are also supported within a WEM window. For example, the conditional statement (i.e., if then [else]) is provided by an atomic widget that accepts a string defining an arbitrary expression in terms of the widget inputs that resolves to a Boolean value either directly (because all inputs are Boolean), or as a result of use of a comparison operator within the expression. This atomic widget has two degenerate outputs which are automatically displayed when the widget is placed. The first corresponds to the YES condition, the second to the NO condition. The conditional widget only generates one or other degenerate outputs when it runs. As a result, any data flow connected to the un-generated output will not be executed. The conditional widget has a single formal input that accepts the Boolean expression, and a large number (up to 26) of degenerate inputs each of which will accept any scalar numeric value or a derived type. Each connected degenerate input can be referred to in the expression by its lower case letter or signal name. The figure below shows an example conditional statement:
Referring now to Figure 1, an example of a conditional statement is shown. In this example, a compound conditional statement of the form: "if (a = b) && (c * d < e) then ... else [if (a > 0.3) then ... else ...]" is provided. Because the outputs 110, 115, 120, 125 of the conditional widgets are both degenerate, either the 'then' clause or the 'else' clause may be omitted simply by not connecting the corresponding output 110, 120. This gives the user the freedom to create any conditional statement that he wishes simply by combining simple 'if blocks as desired. Note also that if the user simply wanted to connect a widget that did not expect a Boolean parameter as input to either the then or the else clause of a conditional widget, he can do so simply by connecting the Boolean output from the conditional widget to the control flow input of the widget required. This is because, in the preferred embodiment, control flow pins may be connected directly to data-flow signals of the system supplied type Boolean. Since control flow inputs are only triggered when a Boolean true value exists, any widget thus connected will only run when the appropriate clause is satisfied. In example illustrated in Figure 1, the else clause of the first conditional widget 130 will produce no output unless the first condition is met when it will output a true value. This means that the expression "a && (b > 0.3)" 140 is not required in the negative case since the widget 135 will not even run unless condition 130 is true.
The case or switch construct is provided by an atomic widget that takes as input two values. The first value is a comma-separated list of constant integer expressions (includes characters) or ranges, the second is an integer value to be evaluated against the list. The output of the case widget is a variable number of degenerate Boolean outputs (each of which preferably represents one of the case conditions being satisfied) and the first of which is always the default case (i.e., no other condition satisfied). Only one case widget output will be generated on any given execution of the widget, and as for the conditional widget, it outputs the Boolean value true. If no specified condition is met then an output will be produced on the default pin.
Referring now to Figure 2, an example case statement using an atomic widget is shown. In this example, the case statement within the widget 210 evaluates the integer input 220 against 5 different values or ranges. Only one of the outputs 231, 232, 233, 234, 235 will be generated as a result of widget 210 execution. This is true even if more than one condition is met due to overlapping ranges. When ranges for a case widget overlap, only the first condition in the list to be satisfied will cause an output. First, in this case, would be represented by going from top to bottom among the outputs 231, 232, 234, 234, 235. Because case widget outputs behave identically to conditional widget outputs, they can be used to trigger other widgets via their control input pins in the same manner described above for the conditional widget. The interface preferably prevents the user from connecting different inputs of a downstream widget to signals that are directly or indirectly connected to different output pins of either a conditional or a case widget within the WEM window. This is because, since only one such pin can be triggered by definition, any downstream widget that relies on more than one such widget output, will by definition never execute. This condition is normally enforced by the block structure of standard programming languages but since, in a visual environment, this structure may not be so apparent, block structuring is preferably enforced by the WEM environment. In the visual environment, the outputs of a case widget may be automatically labeled with the case value. This feature is depicted in the diagram above with respect to outputs 231, 232, 233, 234, 235. The WEM interface is also capable of highlighting all widgets and connections that are 'downstream' of a given selection in the WEM diagram by special Ul actions.
The WEM interface would also preferably prevent the user from connecting a data flow output of any widget (A) to any data flow input of a second widget (B) that either directly or indirectly is required to run in order for the widget (A) itself to become eligible to run. This requirement is made in order to prevent the user from accidentally setting up data flow diagrams that have hidden loops in them that mean they will not execute (or will always execute). Note that this requirement by itself makes it impossible to construct the 'loop' programming construct using pure data flow connections and widgets not expressly designed to implement loops. Loop constructs generally require the use of a variable to pass values from one loop iteration to the next. Once initialized, the variable value is always available and hence removes the possibility of creating a data flow input condition that cannot be satisfied. When a user attempts to create a data flow dependency loop in WEM mode, he is preferably warned of this fact and given the opportunity to create a variable that removes the disallowed dependency. In the event that a data or control flow input pin is multiply sourced, and one source is not dependent on execution of the widget concerned, then it is permissible to connect a downstream widget output to this widget input pin. There are a number of problems associated with loops that make them difficult, if not impossible to implement in a data flow design without enforcing block structuring (i.e., putting the loop body within a compound widget), these are:
• No data flow output can be tied back to a widget that appears earlier in the loop (including the same widget that produces the output) without creating a situation where neither widget can run because each depends on the other to trigger them (known as a deadly embrace). • A data flow signal that comes from code lying outside the loop cannot be directly connected to a data flow input within the loop because the loop may execute many times and will therefore consume the input on the first pass and then hang up.
• A data flow output that comes from code lying inside a loop cannot be directly connected to a data flow input lying outside the loop because the loop may execute many times and will therefore produce a series of outputs which will either unintentionally trigger the widget outside the loop on each pass, or more likely, if the widget outside the loop requires other non-loop inputs, will have to be queued up waiting for access to the data flow signal. It is probable that such a behavior would overload any queuing mechanism provided by the engine to handle multiply connected outputs since such a queue only needs to be as big as the number of connected outputs.
• It is visually very difficult to display the loop concept at a single level so that it is immediately obvious what is, and what is not part of the loop.
For the reasons described above, loops are implemented by one or more system supplied compound widgets that provide a number of degenerate universal input and output pins for passing data of any type into and out of the loop body and which allow specification of the loop behavior.
A suggested set of widget scheduling rules to be enforced by the engine is given in the table below. Many of these rules appear throughout the text above but they are summarized and augmented here in order to make the full rule set more apparent. The term widget is used below to imply both atomic widgets and compound (or view) widgets. When a distinction is required, the particular widget type is explicitly stated. The term signal is used below to refer to either a control flow or a data flow. Where a distinction is required, the type of signal (control or data) is explicitly stated. The term token is used below to refer to a data flow signal to which a value has been written, but has not yet been consumed. A linear compound widget is defined as a one that does not include any explicit connection to the control flow output. A cyclic compound widget is defined as a one that includes an explicit connection to the confrol flow output and which therefore may include explicit loops. A descendant widget Z of an ancestral widget Y within an enclosing compound widget X is defined as any widget within the WEM diagram for X that either directly or indirectly depends on data or control flow outputs from Y in order to become eligible for scheduling. Z is a formal descendant widget of Y if the dependency between Y and Z is mediated by signals connected only to formal widget outputs. Z is a degenerate descendant widget of Y if the dependency between Y and Z is mediated by at least one signal connected to any intervening degenerate widget output. The various descendancy terms described above may also be applied to the data or control flow signals attached to the widget Y. A pure data flow signal is defined as one that is not attached to a variable or constant symbol. A pure descendant data flow is one that can be traced back to a given ancestor through pure data flow or confrol flow signals alone.
Scheduling Rule
A widget is eligible for scheduling only when all of its connected data flow inputs have a token associated with them. A view may be scheduled whenever any of its data flow inputs have a token associated with them but may subsequently 'hang up' should other inputs be required and still be undefined.
If a widget has an explicit connection to its control flow input pin, then that widget (and any widgets it contains) is only eligible for scheduling when the value of the control flow pin is set to TRUE. This applies even if the widget is compound and has already started execution, (i.e., you can single-step a compound widget to any nesting level simply by explicit control of the highest level control pin).
Execution of a linear compound widget (and all widgets called by it) completes when all of its connected output pins have data tokens associated with them (i.e., have been assigned a value).
Execution of a cyclic compound widget (and all widgets called by it) completes when the control output pin is driven TRUE by the control or data flows within the widget. The implementation may encapsulate this functionality so that for standard loops, the user is unaware of the control pin connection.
Once a widget has been scheduled for execution, it cannot again become eligible for scheduling until execution completes.
If a widget input is specified as Only on update' then that widget only becomes eligible for scheduling each time a value is written to the data flow signal connected to that input. This applies even if that signal has an un-consumable token associated with it (see below). If multiple values are written to the input signal before the connected widget is scheduled, it is scheduled only once in response to the series of updates.
The following signals have tokens associated with them that cannot be consumed:
1) Any signal that is connected to a variable symbol once that variable becomes valued. If that signal is also attached (within the compound widget) to a variable symbol, then the input value may be overwritten by subsequent widget action. Variable values once written, persist across multiple executions of the same widget in the same context
2) Any signal that is connected to a constant symbol.
3) Any signal that is directly connected to a widget control flow output.
4) Any signal that is directly attached to a connected or defaulted data flow input of a compound widget.
A pure data flow that is specified as AND consumption logic (the default during construction), causes any tokens associated with that flow to be consumed only after all widgets that have input pins connected to that data flow have been scheduled and executed. If multiple widgets have input pins connected to the pure data flow signal in question, then each may be scheduled only once as a result of any given token appearing on the signal even if that token remains unconsumed.
A data flow that is specified as OR consumption logic (during construction), causes any tokens associated with that flow to be consumed by the first widget that has an input pin connected to that data flow, and which is scheduled and completes.
For a linear compound widget, the engine drives the control output pin FALSE at the time the widget is first scheduled, and TRUE when widget execution completes.
A trash can symbol will immediately consume any tokens associated with the data flow to which the trash can is attached (even if other widget input pins are also attached). Trash cans may not be attached to any signal which by definition cannot be consumed.
Scheduling Rule
Within any compound widget X, once a widget Y has been scheduled and executed, it cannot become eligible for scheduling again while any unconsumed token remains on a pure descendant data flow signal.
Any widget whose output is attached to a multiply sourced pure data flow signal that currently has a token associated with it, can be scheduled and executed (but not completed); the engine will not write any new token(s) produced by that widget until the pre-existing token on the backed-up output data flow signal has been consumed, nor will the engine permit the control flow output to go TRUE until this is the case. Furthermore, the widget (and any widgets it contains) is no longer eligible for scheduling and execution regardless of tokens appearing on its inputs, until the engine has transferred its previous output tokens onto the relevant data flow signals.
If a widget Y within a compound widget X is identified as an 'as needed' widget (for example a dialog widget) then in addition to any other rules that might apply, that widget will not be scheduled or executed until its output is required in order to cause another widget within X to become eligible for scheduling.
Any widget Y within a compound widget X whose outputs are exclusively connected directly or indirectly to unconnected degenerate outputs of X (or to a trash can), will not be scheduled or executed regardless of tokens appearing on its inputs. Furthermore, the widget Y is not considered in any consumption logic applicable to signals connected to its input pins. To all intents and purposes Y is completely ignored in all scheduling activities related to X. This rule can be enforced at load time, it is not dynamic.
Any widget Y within a compound or view widget X, and which has zero connected inputs, never becomes eligible for scheduling or execution. To cause such a widget to execute, its control input pin must be driven true by connecting it either directly to the control input of X or to another Boolean signal within X.
Once any widget Y has been scheduled and executed within an enclosing widget X, it is automatically moved to the last position in the scheduling check sequence so that in addition to all scheduling rules outlined above, the widget Y is not even checked again for scheduling eligibility until every other widget with in X has been checked on a subsequent pass.
All rules described above apply equally and simultaneously to every level of a view and the various subordinate compound widgets that it calls to any arbitrary level of nesting. Scheduling of the various components of each nested WEM diagram occurs independently of other levels except that each nested compound or atomic widget must complete before its output signals become available at the next higher (calling) level and thereby potentially cause one of the rules described above to be triggered at the higher level.
While the illustrated widgets give the appearance of passing widget inputs by value, for efficiency reasons the implementation (wherever possible) passes widget inputs and outputs by reference, not by value. Pass by value is only required in cases where the widget input is overwritten within the widget itself (by use of a variable symbol), and the signal is not simultaneously attached to a formal widget output within the WEM diagram. Because of the scheduling rules described in the table above, the internal values of any inputs to a widget that are supplied by pure data flow connections cannot change during the period of execution of that widget. Preferably, inputs that are externally attached to a variable symbol may potentially change during widget execution.
While the table given above describes the rules that relate to scheduling and execution within a particular context, it is important to understand that simultaneously there may be many active views, all of which are being scheduled and executed. This gives rise to a number of considerations with regards to prioritization between the various views that are illustrated in the scheduling algorithm.
The scheduling algorithm forms the core of the system architecture in that all system functionality, at some level or another, is initiated as part of a view launched within the scheduling environment (referred to as the 'widget engine'). The WEM user interface, including widget building and view editing, can be thought of as a separate application from the scheduling process itself, and could be replaced with other user interfaces without changing the widget engine itself. The widget engine is a strongly-typed data flow interpreter which can read in and subsequently execute atomic and compound widgets together with the data structures that define their I/O needs and characteristics.
Referring now to Figure 3, a sample embodiment of a Widget Editing Mode (WEM) window 300 is shown. In the illustrated example, the window 300 is a standard, titled, resizable window with scroll bars 305. The window 300 is used to define and edit data-flow functionality by connecting and configuring widgets 310. The two blocks 315, 320 connected by arrows to the edge of the window are the input and output bar of the compound widget being viewed. In this example, a single degenerate input 330 and single degenerate output pin 335 have been defined for this compound and connected to an embedded compound 310. In the preferred embodiment, this example could be created simply by clicking on the pin 330, dragging to the destination pin 340 it is to be connected to, and setting the type. The specialized pins 345, 350 at the top of the input 320 and output bars 315 are the control input pin 345 and control output pin 350 respectively. In the preferred embodiment, their type is always equivalent to 'Boolean'. As this diagram illustrates, the confrol output pin is wired to the constant 355, in this case true, which will enable the contents of the compound widget to run. The background widget 3.60 is a pre-supplied atomic widget serving the specialized purpose of defining the background visual appearance of the associated window. In this embodiment, the tool bar 370 provides (starting from the top):
• The arrow tool 371 is used as a toggle switch to turn options on/off, or it simply selects items.
• The lasso tool 372 can select freeform areas by clicking down and selecting the section.
• The hand 373 moves the entire contents of the WEM window in different directions.
• Label 374 can place a label on any element in the WEM window.
• The clipboard 375 is activated when information is copied or cut to the clipboard. Select it to use as a paste tool when clicked at the paste position.
• Click the widget tool 376 to insert a new compound widget.
• Click the variable input tool 377 to insert a variable.
• Click the constant input tool 378 to insert a constant.
• Use the lightening bolt tool 379 to delete elements in the window.
• Select the speaker 380 to set the volume.
• Window size boxes 381 allow enlarging of the window. The default setting is one white square. This setting will not allow the window to be enlarged further than a few inches. The available settings permit expansion of the window vertically, horizontally, or both ways.
• Grid tool 382 can be used to select to set the grid to which all data flow lines and objects snap in the window. It is possible to move a selected item from 1 to 8 pixels at a time.
Referring now to Figure 4, a full-featured icon-editor that allows alteration of the widget icon is shown. In this example, the result of double-clicking on the icon 390 in the Figure 3 is shown.
In the illustrated embodiment, a menu bar 410 is provided which provides an interface to a set of unique tools. Working across the menu bar at the top of the window (from left to right):
• The view-pack menu 411 allows navigation between various members of a view pack in order to allow single session editing of the entire pack/report. • Once widgets are created within widgets, it is possible to move up or down the widget hierarchy with a up/down menu item 412.
• The view menu 413 allows navigation and selection of any view stored on disk.
• The widget menu 414 allows selection of any widget stored on disk
• The file menu 415 allows standard save/load type actions to/from disk A sample embodiment of a file menu 415 of the WEM is provided in Figure 5.
• The Edit menu 416 is a standard Edit menu much like that found in any other application.
• The Add menu 417 allows new widgets to be chosen and added as well as allowing the addition of other objects in the WEM diagram. A sample Add menu 417 of the WEM is illustrated in Figure 6. In this example, a compound widget is selected.
• The Align menu 418 allows various aspects of the WEM diagram internal alignment to be configured. A sample Align menu 418 of the WEM is illustrated in Figure 7. In this example, the flow selected is "Flow left->right".
• The Display menu 419 allows various visual components of the WEM diagram and its contents to be configured as far as their appearance in the diagram is concerned. A sample Display menu of the WEM is illustrated in Figure 8. In this example, the sub menu "VEM Options" is selected.
• The Text menu 420 provides standard control over text appearance such as color, style, font, size, etc.
• The Setup menu 421 allows access to a number of additional 'daughter' windows that can be used to examine and edit the details of the various types of objects in the WEM diagram. A sample setup menu 421 is illustrated in Figure 9.
• The Debug menu 422 is used primarily during run-time debugging of widget execution and allows examination of the state of all flows, widgets and pins and the tokens and data on them. A sample embodiment of the debug menu 422 of the WEM is provided in Figure 10.
Referring now to Figure 11, a sample Pin information dialog 1100 is shown. In the preferred embodiment, this dialog 1100 is generated in response to either double-clicking on a pin in the diagram or using the menu 421. Various aspects of the pin, including it's type (as preferably determined by the run-time type system) and any other logic associated with the pin and it's dataflow behavior can be set from this dialog.
Referring now to Figure 12, a user in the process of choosing the type 1210 of a constant symbol in the WEM diagram within the type pop-up menu 1210 of the constant information window 1200 is shown. This further illustrates the connection between the types system provided by the substrate and the types of data on flows and pins.
Referring now to Figure 13, a dialog window 1300 generated in connection with selection of the view or widget information window in the setup menu 421 is shown. As can be seen, the dialog window 1300 allows adjustment of a wide variety of different aspects that apply to the view or widget including file path, security settings, operation behavior, visual dimensions, behaviors, and limits, and a variety of configuration and documentation descriptors.
It is clear, then, that the illustrated WEM and visual language described above allow users of the system to express and specify analytical processes in terms of data flowing between a set of computational blocks. The visual language of the present invention preferably provides the following basic features:
a) The ability to pass strongly, typed data through flows between a set of interconnected computation blocks (hereafter called widgets). Types are preferably run-time definable and examinable by the widgets themselves.
b) Widgets with typed input and output pins. Input pins provide the ability to specify default values if unconnected.
c) The ability to add arbitrary compiled code snippets to the collection of available widgets, shareable between users of the system. Such compiled code widgets are referred to as 'atomic'.
d) After creating an algorithm by wiring together widgets into an enclosing or 'compound' widget using WEM, permitting the compound widget itself to be used as a building block for higher-level widgets. That is the language would preferably allow arbitrary nesting depth of compound widgets. e) Because many widgets have associated Ul, the graphical environment provides the ability to lay out the Ul of various widgets appearing within the same window. In the preferred embodiment, within any atomic widget, an atomic GUI building environment is provided to allow layout of the atomic widget Ul components. All such information is saved as part of the widget definition for sharing and later re-loading purposes.
f) Normal looping and conditional constructs are supported as are junctions and associated logic joining flows connected to multiple endpoints.
g) When scheduling, the existence of a data token on a flow must precipitate code execution on the connected flow-consumer widgets.
h) The language preferably supports the overt graphical specification of variables and constants that participate in the wiring.
i) Finally, in the preferred embodiment, a debugging means is provided, at run-time, to examine the contents and state of flows and the state of execution of all widgets involved.
At the same time the data-flow wiring for a new view or widget is defined, the visual appearance is created. The interface that allows this is called View Editing Mode (VEM). Referring now to Figure 14, a simple calculator widget/view 1400 is shown. The figure displays the structure of the view 1400 of the calculator. Each section of this figure (such as the buttons, title bar, calculator display window) can be created separately, and the individual sections of the view result in the final view, which also may be created and edited in the View Editing Mode window.
Referring now to Figure 15, an illustrated of the structural components of the calculator widget/view 1400 is shown. In this case, broken-down structure comprises:
• Background 1510 - The plain background of the calculator where the number keypad will be added;
• View Layout 1520 - The view layout (the keypad itself);
• View 1530 - The final view , including the background 1510 and view layout 1520, complete with 0.0 shown as the initial output on the display is shown. Logically, something would need to be attached to the keys on the keypad to allow for performing calculations. Clicking the visually displayed numbers of the photograph of a calculator does not perform a function. These numbers would need to be attached to something that could actually read and manipulate them. In other words, a mere picture does nothing. Hence, once the drawing is done, the keys must be connected to an electronic device representing each individual key and its underlying meaning. This electronic equivalent, in our case, is known as a widget. Widgets are connected to the keys and act as valves that regulate the flow of electronic information. On the calculator, for instance, the widget for the 9 key would act as a valve for the constant valve 9; the plus sign (+) widget would act as the valve for the add operation. In the preferred embodiment, the VEM process allows the appearance of the calculator to be created. Once the physical appearance is complete, the internal connections must be made to enable arithmetic functions. Widgets, electronically connected to the numeric keypad of our calculator, display a different diagram, but are identical in performance to the calculator.
Referring now to Figure 16, an internal diagram of the calculator as it would appear in the preferred Widget Editing Mode window is shown. This figure illustrates a view known as a view widget, which contains a collection of atomic or compound widgets, each of which may have at most one user interface region, or pane. It is in this window that users can make modifications using the WEM capabilities described above.
For explanation purposes, each individual column in the diagram is described and numbered as a single item. It is described in this fashion because each element within the column performs the same general function.
• Column 1610 displays the input bar which has no connections in this case.
• Column 1620 consists of numbered rectangles that represent the constants 0 to 9 displayed on the calculator.
• Column 1630 consists of widgets that perform like valves, regulating the data flow or the flow of the constants 1620.
• Column 1640 displays rectangles with visual operands such as the plus sign (+), the equal sign (=).
• Column 1650 contains the widgets that perform like valves, regulating the flow of the constants.
• The widget 1660 performs the sum.
• Column 1670 includes the widgets that carry the sum to the total. • and that total is then sent to the output bar 1680.
The data-flow scheduling algorithm is the next important part of the system. The data-flow scheduling algorithm is described below by listing the algorithms for a series of recursively invoked functions. The global value "EG" is a complex structure containing various context and state information used by the environment and including the values utilized by the scheduling process.
The top level of the data-flow based scheduling algorithm is the routine SC_ScheduIer(3 which is called in a continuous loop from the main thread of the environment. This routine arbitrates the scheduling of the various active views currently loaded into the environment. The principal task performed by this routine is to enforce the levels of scheduling priorities associated with the active views. To do this SC_Scheduler() makes use of a global active views scheduling structure which contains a set of list headers each of which points to the first element in a singularly linked list of active views having the same priority level. Because this routine locks the view being scheduled, any code operating in the main application thread that is called via this routine can be sure that pointers to structures within the current view will not become invalid during procedure execution. Code running in other threads must either lock the view, or save/restore pointers in a relative form to ensure correct pointer values across scheduling boundaries or heap movements. SC_Scheduler() (and everything it calls) assumes that the application thread is in a critical section (i.e., can't be pre-emptively disturbed). While there are outstanding events to be processed in any view, this routine alternates between scheduling the view at the top of the pending events list (and then rotating the list) and scheduling a view according to the normal view priority scheme. In this manner the system ensures that events are processed as rapidly as possible without allowing event intensive views to suppress all other scheduling. The same mechanism is repeated in SC_ScheduleView() to the normal free walking algorithm.
void SC_Scheduler ( // data-flow scheduler void
) // R:void
{ bump the scheduler cycle count handle any pent-up interrupt level stuff after any slot j = rand ( ) ; // breaks certain deadly cycles! j = j | (1 << (kLowestEPriority+1) ) ; // set backstop bit
EG->Priority = find the first bit set in cycle count word j if ( EG->Priority > kLo estEPriority )
{ // run any background tasks do whatever regular monitoring etc. environment wants to do return; // at lowest priority possible. tmp = NULL; pnd = NULL; if ( ! (EG->MitopiaFlags & kVeventBasedSlot) && EG->PendEvtHdr )
{ // do views with events first pnd = tmp = EG->PendEvtHdr; EG->Priority = (*tmp) ->dPriority; // set priority to match view
EG->MitopiaFlags ]= kVeventBasedSlot; // remember we did an event slot
} else // alternate between event and
{ // normal slots on each pass
EG- >MitopiaFlags &= -kVeventBasedSlot ; // just a plain kind of slot tmp = EG- >ActiveViews [EG->Priority] [03 ; // front active view at priority pnd = 0 ;
}
SC_SetCurrent idget (tmp, iew widget (*tmp) ) // set the chosen view widget lock down the view (tmp) while we cruise around it and schedule below tmp = SC_ScheduleView(tmp, ...) ; // schedule a single view unlock the view (tmp) till the next time... rotate EG->Aσ iveViews [EG->Priority] [0] to tail of list at priority if ( (EG->MitopiaFlags & kVeventBasedSlot) && EG->PendEvtHdr == pnd && pnd)
{ // rotate pending list also move pnd to tail of EG->PendEvtHdr list // avoids greedy event problems }
}
As can be seen from the algorithm above, scheduling within any given view is handled entirely by the routine SC_ScheduleView() once the view itself has been selected based on pending event lists and priority. This routine is called by SC_Scheduler() to give a scheduling slot to a particular view. In most cases this amounts simply to a call to SC_ScheduleNode() for the view widget, but in addition this routine must deal with the special rules associated with starting and stopping views and the propagation of their tokens. Note that an exception to the fair handling of scheduling slots is made for any widgets that are waiting for non-timer related events which have occurred, these are scheduled immediately in order to ensure that events get eaten ASAP. An example of the logic that could be used to perform this routine is provided in Appendix A.
The two main routines that are called by SC_ScheduleView() above are SCJScheduleNodeO and SC_ScheduleANodeQ. SC_ScheduleNode() is the primary function that is responsible for enforcing the rules of data-flow in the system. This routine is recursive and is responsible for implementing the depth first tree walking scheduler algorithm. In order to facilitate navigation around the various levels of the compound widgets that make up the hierarchy associated with a given view, SC_ScheduleNode() makes use of three basic structures: the widget descriptor record (type ET_Widget), the flow descriptor record (type ET_Flow), and the pin descriptor record (type ETJPin). The following are the scheduler uses of the relevant fields in an ET_Widget record:
tokenHdr - This field contains the header into a dynamic list of active tokens associated with data or confrol flows inside a compound widget. tokenHdr = 0 if the list is empty. tokenTail - This field contains the tail (last element) of the tokenHdr list. flowHdr - This field is the header into a static list of control and data flows inside a compound widget. FlowHdr = 0 if the list is empty. sWidgHdr - This field is the header into a list of widgets within the current compound widget. cWidgHdr = 0 if the list is empty. sWidgNext - This field contains the link elements for the list header by sWidgHdr for the surrounding compound widget (i.e., it points to the next widget in the enclosing widgets sWidgHdr list). sWidgNext = 0 if no more elements in the list. The field sWidgPrev is the same but points in the reverse direction to sWidgNext. flags - This field contains various logical flags indicating to the scheduler the state of the current widget. Of particular relevance is 'hasChildTokens' which indicates that at least one widget in the sWidgHdr list has active tokens associated with it. The flag
'hasTokens' indicates that the current widget itself has a non-empty tokenHdr list.
The following are the scheduler uses of the relevant fields in an ET_Flow record:
tokenLink- This field is the link to the next element in the tokenHdr list of the enclosing compound widget. tokenLink = 0 if there are no more elements in the list. flowLink - This field is the link to the next element in the flowHdr list of the enclosing compound widget. flowLink = 0 if there are no more elements in the list. value - This field contains a handle to the heap storage allocation for the actual data value associated with the flow (if allocated). In the case of a control flow, value=0 and the flow state is stored in one of the Flags field bits. cIpinHdr - This field contains the header into a static list of contained widget input pins that are connected to the current flow. cIpinHdr = 0 if the list is empty. Note that an input pin to compound widget may be in the connected input pin list for a flow within the widget that contains it's parent while also being in the connected output pin list of a flow internal to its parent. cOpinHdr - This field contains the header into a static list of contained widget output pins that are connected to the current flow. cOpinHdr = 0 if the list is empty. Note that an output pin of compound widget may be in the connected output pin list for a flow internal to its parent, while also being in the connected input pin list of a flow within the widget that contains it's parent. flags - This field contains various logical flags indicating to the scheduler the state of the flow. 'isConfrolflow' indicates that the flow is a control rather than a data flow. 'hasToken' indicates that the flow has a token associated with it. 'useORlogic' specifies OR rather than AND consumption logic. 'unConsumable' indicates that tokens associated with the flow cannot be consumed. 'hasBreakPoint' and 'hasWatchPoint' are used to initiate debugging activities.
The following are the scheduler uses of the relevant fields in an ETJPin record:
cIpinLink - This field is the link to the next element in the cIpinHdr list of the connected flow. cIpinLink = 0 if no more elements in the list. cOpinLink - This field is the link to the next element in the cOpinHdr list of the connected flow. cOpinLink = 0 if no more elements in the list. parent - This field contains a reference to the widget record for the widget whose input/output pin this ETJPin record describes.
During normal processing, the scheduler algorithm attempts to walk any given free (view) in the environment's active views list and when it finds an active token that can potentially be consumed by running or resuming an atomic widget, it does so. The algorithm is predicated on the following facts:
• The mission of the scheduling algorithm is to attempt to consume any active data flow tokens in the view, thereby completing the view.
• Only atomic widgets actually do anything, so the algorithm must continue to walk the tree until it finds an atomic widget whose input is connected to an active data flow, and then execute it (if possible) in the hope that the widget will complete thereby consuming all outstanding tokens connected to it's inputs. • Many widgets produce more tokens on their outputs after consumption of the input tokens.
• Because a widget (atomic or compound) only consumes tokens on its inputs when it completes, this means that all ancestral (i.e., enclosing) compound widgets of any atomic widget that has not yet completed, must also have unconsumed tokens on their inputs. This in turn means that the scheduler is guaranteed to find all outstanding tokens in a view, no matter how deeply they are nested, simply by looking at only those enclosing widgets. For each level in the tree that has outstanding tokens, the enclosing widgets will have outstanding tokens on their inputs as well. The result is that rather than having to examine every compound widget in a WEM diagram tree, or even every data flow in the WEM tree, the scheduler can be sure that by examining only what is connected to data flows with active tokens, it has examined every widget in the view that has the potential to execute. Within any given compound widget, this list is referred to as the token list. These lists are preferably arranged in a tree structure that can be traced all the way back to the view widget itself. At any given moment, there are vastly fewer active tokens within a view than there are either widgets or data flows. Hence, the efficiency of this algorithm greatly exceeds other free traversal strategies.
• Whenever an atomic widget consumes its input tokens, it does so by removing them from the token list of the enclosing compound widget. If this token list becomes empty then the compound widget itself has completed and the scheduler should therefore consume any tokens on it's inputs and generate the necessary output tokens in the parent WEM of the compound widget. This process continues all the way up the free until the scheduler detects an empty tree at which time the view is complete.
The scheduler tree traversal algorithm is recursive, i.e., it calls itself repeatedly as it walks down the tree, starting at the view widget until it finds a leaf node (atomic widget) that can be scheduled. It then either starts or resumes that widget and when the widget completes, it returns back up the calling chain. As the algorithm climbs back up the path it rotates the token list for every level in the tree by moving the token that was at the front of the list (i.e., the one that determined which attached widget it chose in the downward path), to the back. The effect of this repeated descent and ascent algorithm is to allocate sequential time slices, at any given level of the tree, to widgets that are as far apart as possible in the tree. This is designed to prevent undesirable bunching of time allocations to a given compound widget. Atomic widgets that are higher up in the tree will get more time slices than those that are further down. This is as it should be since higher up atomic widgets generally correspond to Ul related displays and controls which must be as responsive as possible, and which will not actually be eligible to run unless the Ul event on which they are waiting has occurred. One possible side effect of the algorithm is that at any given level, the smaller branches of an unbalanced free get more scheduling slots than larger ones. A tree-balancing algorithm, if desired, could correct this behavior. This algorithm returns to the caller (SC Scheduler) after a single descent and ascent. SC_Scheduler() itself then selects another view and priority group and repeats the process. Thus available CPU time slots are distributed over all views in the system according to priority. Widgets in many other views may be scheduled before SC_Scheduler() again returns to this view and performs another descent and ascent of this tree. Sample code for one embodiment of SC ScheduleNode is provided in Appendix A.
The logic for SCjScheduleANode (schedule atomic node) is broken out separately from SC_ScheduleNode() so that nodes that are atomic can be forcefully scheduled based on non-dataflow related events. Sample code for SC_ScheduleANode() is provided in Appendix A.
The routine SCJStartWidgetO is responsible for checking that all the necessary conditions have been met for starting a particular widget. This routine is therefore responsible for enforcing the rules of data flow as well as the modifications to these rules described above. Once SC_StarfWidgetQ has determined that a widget is eligible to run, it actually launches it using either SC_StartAWidgetO or SCjStartCwidgetQ (depending on whether the widget is atomic or compound). If the widget concerned is ineligible to run for any reason, this routine returns FALSE otherwise it returns TRUE. This routine can also be called with the parameter 'JustCheckin' set to TRUE in which case it makes all necessary checks for eligibility (other than those for input availability) but does not actually cause the widget to be started. That is, it calls itself under certain circumstances in order to find out if widgets that are descendant from the current widgets (in terms of data flow, not hierarchy) have started or are ready to start. Sample code for this Algorithm is provided in Appendix A. This routine is recursive.
The function SCjStartAwidgetO is called by SCJStartWidgetO once it determines that all the necessary conditions have been met to actually initiate execution of an atomic widget. Initiating execution of an atomic widget involves creating a seperate execution thread for that widget to run in. In order to maintain this seperate thread, the thread manager software requires a seperate stack area which the atomic widget will use once launched. Every atomic widget contains a stackSize field which gives the maximum size of stack that the widget anticipates will be required in order to execute. Because the atomic widget retains control of the CPU once the thread has been launched, the scheduler has no way of preventing erroneous widgets from stepping outside their stated stack allocation and thus corrupting the heap. It is therefore very important that widgets ensure that this does not occur. This routine can however detect that such an error has occured after the fact and when widget execution completes, SC_StartAwidget() will report an appropriate error if stack debugging is enabled. The mechanism used is to place test patterns at various points within the allocated stack area, especially at the end point. When widget execution completes, these patterns will have been erased up to the deepest point that the widgets stack reached. If the test pattern at the end of the allocation has been overwritten then the widget is erroneous, otherwise the other test patterns may be used to determine actual stack requirements. Filling an area of heap with these test patterns consumes time and stack debugging should preferably be enabled only when developing new atomic widgets. Because a widgets initialization code may contain suspends, this routine may be re-entered a number of times for the same widget before initialization is complete. By returning a false for inclomplete initialization and not setting the "klsRunning" flag, we can be sure that SC_ScheduleNode() will keep calling us until done. Sample code for one embodiment of SC_StartAWidget is provided below:
Boolean SC_ _StartAwidget ( // Start atomic widge' execution
ET_ViewHdl aView, // I : iew handle
ET_WidgetPtr a idP, // I:widget record pointer
Boolean InitializeOnly // I: if TRUE, just initialization
) // R:TRUE if started
{ if ( a : LdP- >wThreadID ) // thread was already running
{ if ( ! (FLAGS (aWidP) & kHasBeenlnitialized) ) // resume/start initialize
SC_Resume idget (aView,aWidP,NO) ; // Resume the widget if ( !( (FLAGS (aWidP) & kHasBeenlnitialized) aWidP->wThreadID) )
// make a widget thread aWidP->wThreadID = create new thread err = yield to thread (aView, SaWidP,kInitializeEntryPt ...) ; if ( ! InitializeOnly && ! (FLAGS (*aView) & kKillThisView) ) if ( lerr && (FLAGS (aWidP) & kHasBeenlnitialized) ) err = yield to thread (aView, &aWidP, kExecuteEntryPt ...) ; return (err 0 && (FLAGS (aWidP) & kHasBeenlnitialized) ); The routine SC_StartCwidgetO starts execution of a compound widget once all the necessary preconditions have been satisfied. Since there is no code associated with a compound widget, the process of starting one essentially consists of copying the tokens on the external input pins into the internal flows of the compound widget so that these may in turn stimulate contained widgets into execution. Sample code for one embodiment of SC__StartCWidget is provided below:
Boolean SC_StartCwidget ( // Start compound widget execution
ET_ViewHdl aView, // I: View handle
ET_WidgetPtr aWidP // I: widget record pointer
) // R:TRUE if widget was started
{ oldFlags = FLAGS (aWidP) ;
FLAGS (aWidP) |= klsRunning + kHasBeenlnitialized; // set widget's init & run flags for (all formal and degenerate inputs)
{ mask = get the masks for available inputs i = get count of number of pins of that type while ( i ) // for all pins of this type
{ i--; pinName = i + 'A' or 'a'; pin = get the pin concerned iflow = get the flow connected to it within the compound widg. xflow = get the flow connected to it outside the compound widg. if ( iflow )
{
SC_AddAToken (iflow) ; // add a token to internal flow if ( iflow->value ) // dispose of old data
(if any)
TM DisposeHandle (0, (anonHdl) iflow->value, ... ) ; if ( Ixflow ) // if pin input ! available
{ // pin must have been defaulted iflow- >value = pin->pDefault;
} else iflow- >value = xflow- >value; // external to internal copy
} } } if ( ret ) SC_SpontaneousTokens (aWidP) ; // generate spontaneous tokens if ( aWidP == view widge (*EG->CurrentView) && ! (oldFlags & kHasBeenlnitialized) )
{ // routine to init. everything
SC InitializeCompoundAtomics (EG->CurrentView,aWidP) ;
} return ret;
} In the preferred embodiment, the routine SCJResumeWidgetO resumes execution of an atomic widget that has previously suspended by calling SCJSuspendO either directly or indirectly. This function assumes that all necessary conditions for execution have been checked at the time the widget was started and thus it does not need to repeat such checks. Resumption of an executing widget essentially consists of an explicit yield to the relevant thread. The only subtelty in SC_ResumeWidget() is its use to generate certain time based events (idle, tick, second) prior to resuming the thread if the specified time interval has elapsed and the widget is waiting for the time based event specified.
In the preferred embodiment, the routines SC_CheckCtrlStopO and SC_CheckCtrlStartO may be used to check a flow connected to a confrol pin to determine if it implies that a widget should be stopped/started. In the preferred embodiment, the routine SCJTimeToGobblelnputsO may be used by the scheduler to determine if it should schedule a given widget based on the state of it's input pins. The logic is complicated by the fact that 'exclusive' pins can cause widgets to fire even when only a subset of the inputs is available.
In the preferred embodiment, the routine SC_Trace2Inputs() can be used to check all the outputs of a given widget 'aWidP' to see if they directly or indirectly lead to completing the required inputs of a second widget 'cwidg'. The purpose of this is to implement the 'as needed' function whereby widgets that are marked as 'as needed' will only be scheduled by the environment when by running, their outputs might potentially cause another normal widget to become eligible to run. This is the behavior required of many Ul type widgets such as dialogs. See SC_StartWidgetO for usage.
In the preferred embodiment, the routine SC_StopCWidget() is called to complete execution of a compound widget. As for atomic widgets, completing compound widget execution involves propagating tokens onto the output flows. Since the output flows of the compound widget may be busy, there is a possibility that the token propagation routine (SC_PropagateTokens()) may hang up. To simplify this problem, a seperate temporary thread is created to perform the compound widget completion action thus allowing for the possibility of backup. Unlike conventional widget threads referenced from the wThreadlD field of the widget record, the threads associated with completing compound widgets are torn down and re-cycled as soon as the token propagation is complete, also these threads only execute internal environment code, not widget code. Note that because the thread may back up, it may be resumed in SC_ScheduleNode() many times before completing. In the preferred embodiment, the routine SC SpontaneousTokensO is called whenever a compound widget is started by the scheduler, and is responsible for generating any spontaneously produced tokens contained within the WEM diagram for that widget. Spontaneously produced tokens are generally associated with constant symbols. Note that although flows with variable symbols attached have unconsumable tokens on them, these tokens are not generated until the flow is first written to, i.e., they are not spontaneous. This routine does not check for whether the output flow is busy and hang up waiting for it to be clear. This is because this is not possible given the fact that this routine is called during widget starting at which time all internal flows are by definition free. Anyway to do so would be fatal to the main thread. In the preferred embodiment, the routine SC_AddAToken(3 adds a token to an existing flow.
In the preferred embodiment, the routine SC_InitializeCompoundAtomicsO is recursive and initializes all atomic widgets within the specified compound widget and any compound widgets it contains either by calling SC_StartAWidget() or by recursively calling itself as required.
Widget Pin Access API
The API definition below gives the basic public calls available to widgets/threads when accessing data on input pins and writing data to output pins. The API is intended to be illustrative only and is by no means complete. The header files for a sample API implementation is provided in Appendix B.
In the preferred embodiment, the function PCJNumDatalnputsO examines the Widget Input List contained in the specified (or defaulted) widget and returns the counts of the number of formal and degenerate input pins. In the preferred embodiment, the function PC_NumDataOutputs() examines the Widget Output List contained in the specified (or defaulted) widget and returns the counts of the number formal and degenerate output pins.
In the preferred embodiment, the function PC_GetDataInput() takes an input specifier ( 'A' <= char <= 'Z' or 'a' <- char <= 'z') and returns a handle to the storage value for that input or NULL if not found, or if the value of the connected flow is invalid. The handle returned by PC_GetDataInputQ would preferably NEVER be de-allocated by widget code. The handle returned may be subject to relocation or resizing by the scheduler across any scheduling boundary.
In the preferred embodiment, the function PC_GetDataInputTypeO takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns the type ID for that type. In the preferred embodiment, the function returns zero if the input was not found. The widget may use the returned type ID to obtain further information about the type using the routines provided by the type manager package. In the preferred embodiment, the function PC_GetDataOutputType(3 performs a similar function for output pins. In the preferred embodiment, the function PC_SetDataInputTypeO takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and a type ID, and sets the type field of the corresponding pin to match the type ID. PCjSetDataOutputTypeO may be used to do the same for output pins.
In the preferred embodiment, the function PC_GetDataInputName() takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns a handle to the name string for that input or NULL if not found or unnamed. The caller should dispose of the handle returned by this routine when the string is no longer required. In the preferred embodiment, the function PC_GetDataOutputName() is used for output pins.
In the preferred embodiment, the function PC_IsDataInputConnected() takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns a Boolean indicating whether the input is connected or not. If the input does not exist, a FALSE is returned. Note that if the input is degenerate and PC_IsDataInputConnected() returns FALSE, the input may still have a default value assigned to it which can be retrieved using PC_GetDataInput(). Thus the combination of a FALSE from PC sDatalnputConnectedQ with a non-NULL result from PC_GetDataInρut() uniquely defines a defaulted degenerate input. A TRUE from PCJsDatalnputConnectedQ together with a null result from PC_GetDataInput() indicates an invalid data flow connected to the input. This routine is provided in order to allow atomic widgets to implement the logic associated with degenerate input pins. Because formal inputs are by definition connected (enforced by WEM), this routine simply returns TRUE when called for formal inputs.
In the preferred embodiment, the function PC_IsDataOutputConnected() takes an output specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns a Boolean indicating whether the output is connected or not. If the output does not exist, a FALSE is returned. This routine is provided in order to allow atomic widgets to implement the logic associated with degenerate output pins. Because formal outputs are by definition connected (enforced by WEM), this routine simply returns TRUE when called for formal outputs. In the preferred embodiment, the function PCJDoesOutputHaveTokenO can be used to determine if a particular output exists for a widget and has an unconsumed token value already assigned, TRUE is returned in this case, otherwise FALSE. In the preferred embodiment, the function PCjSetDataOutputO takes an output specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and assigns a new value to it. The function preferably returns a Boolean indicating whether the assignment was completed successfully or not. The value is passed to PCjSetDataOutputO as a void pointer reference, together with an integer parameter specifying the size of the output object to be created. This routine copies the value into the output value handle in the heap, creating or resizing the handle as necessary. If the output flow already has a token associated with it, this function creates a temporary storage allocation to hold the value. The scheduler will copy any temporary storage values into the connected output data flow when widget execution is complete and the connected output flow becomes free to accept new tokens. Once the value has been copied, the original passed in via the 'data' parameter may be discarded. The only output of this function is the updated value in the heap and flag settings in the widget record.
In the preferred embodiment, the function PCJSetControlOutputO sets the value of the control output pin to either true or false. Most normal atomic widgets will not need to use this function since the environment will by default set the control output to false when the widget begins execution and true on completion. Only those widgets that are performing loops or synchronizing functions and whose control output is intended for modifying the normal scheduling sequence of the WEM diagram within which the widget resides will explicitly control this pin using PCJSetControlOutputO. The effect of these values on the external WEM are:
TRUE - This will cause any externally connected widget to be eligible to run FALSE - Any externally connected widget will be ineligible to run
Note that because control flow values change in the external WEM diagram immediately they are written (as opposed to data flows which change when the writing widget terminates), this routine must also perform the necessary logic to maintain the environment flow and token lists as a result of any value change. For data flows, the Scheduler performs this logic when an atomic widget completes.
In the preferred embodiment, the function PC_GetInputFIowNameO takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns a handle to the name of the flow in the surrounding WEM diagram that is connected to that input or NULL if not found. The caller should dispose of the handle returned by this routine when the string is no longer required. In the preferred embodiment, the function PC_GetInputFIowTypeO takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns the type ID for the flow connected to that pin. In the preferred embodiment, the function returns zero if the input was not found. The widget may use the returned type ID to obtain further information about the type using the routines provided by the type manager package. Note that the type of the flow and the type of the input pin are normally the same and hence a call to PC_GetDataInpufTypeO would suffice, however certain widgets that accept a given parent type (e.g., scalar) may wish to examine the type of the flow actually connected in order to determine which descendant type was actually connected (e.g., double, int32 etc.).
In the preferred embodiment, the function PC_GetOutputFIowName0 takes an output specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns a handle to the name of the flow in the surrounding WEM diagram that is connected to that output or NULL if not found. The caller should dispose of the handle returned by this routine when the string is no longer required. In the preferred embodiment, the function PC_GetOutputFlowType0 takes an output specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z' ) and returns the type ID for the flow connected to that pin. In the preferred embodiment, the function returns zero if the output was not found. The widget may use the returned type ID to obtain further information about the type using the routines provided by the type manager package. Note that the type of the flow and the type of the output pin are normally the same and hence a call to PC_GetOutputType() would suffice.
In the preferred embodiment, the function PC_DoesInputExistO can be used to determine if a particular input exists for a widget, TRUE is returned if the input exists, otherwise FALSE. In the preferred embodiment, the function PCJDoesOutputExistO is similar for outputs.
In the preferred embodiment, the function PC_GetStaticDataInputO takes an input specifier ( 'A' <= char <= 'Z' or 'a' <= char <= 'z') and returns a handle to the storage value for that input or NULL if not found. Unlike the routine PC GetDatalnputO, this routine will also search on flows that have no associated token for an attached constant object or defaulted output and return any value found. This means that this routine will operate at initialize time as well as execute time. This routine also has the ability to monitor changes on an input flow at run time that do not necessarily have a token associated with them. This often occurs when a widget has written a value onto a flow but has not yet completed and thus has posted no tokens. Use of this "tokenless" communication path is strongly discouraged except in exceptional circumstances. The handle returned by PC_GetDataInput() should NEVER be deallocated by widget code. The handle returned may be subject to relocation or resizing by the scheduler across any scheduling boundary, widgets should be careful not to de-reference the handle and use the de-reference value across such a boundary. Widgets should avoid "Locking" data handles where possible since this will reduce the schedulers ability to resize the handle in response to new data.
The foregoing description of the preferred embodiments of the invention has been presented for the purposes of illustration and description. For example, although described with respect to the C programming language, any language could be used to implement this system. The descriptions of the header structures should also not be limited to the embodiments described. While the sample pseudo code provides examples of the code that may be used, the plurality of implementations that could in fact be developed is nearly limitless. For these reasons, this description is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.
SYSTEM AND METHOD FOR MANAGING MEMORY Inventor: John Fairweather
. BACKGROUND OF THE INVENTION
The Macintosh Operating system ("OS"), like all OS layers, provides an 4API where applications can allocate and de-allocate arbitrary sized blocks of memory from a heap. There are two basic types of allocation, viz: handles and pointers. A pointer is a non- relocatable block of memory in heap (referred to as *p in the C programming language, hereinafter "C"), while a handle is a non-relocatable reference to a relocatable block of memory in heap (referred to as **h in C). In general, handles are used in situations where the size of an allocation may grow, as it is possible that an attempt to grow a pointer allocation may fail due to the presence of other pointers above it. In many operating systems (including OS X on the Macintosh) the need for a handle is removed entirely as a programmer may use the memory management hardware to convert all logical addresses to and from physical addresses.
The most difficult aspect of using handle based memory, however, is that unless the handle is 'locked', the physical memory allocation for the handle can move around in memory by the memory manager at any time. Movement of the physical memory allocation is often necessary in order to create a large enough contiguous chunk for the new block size. The change in the physical memory location, however, means that one cannot 'de-reference' a handle to obtain a pointer to some structure within the handle and pass the pointer to other systems as the physical address will inevitably become invalid. Even if the handle is locked, any pointer value(s) are only valid in the current machine's memory. If the structure is passed to another machine, it will be instantiated at a different logical address in memory and all pointer references from elsewhere will be invalid. This makes it very difficult to efficiently pass references to data. What is needed, then,-is a method for managing memory references such that a reference can be passed to another machine and the machine would be able to retrieve or store the necessary data even if the physical address of the data has been changed when transferred to the new machine or otherwise altered as a result of changes to the data.
APPENDIX 1 SUMMARY OF THE INVENTION
The following invention provides a method for generating a memory reference that is capable of being transferred to different machine or memory location without jeopardizing access to relevant data. Specifically, the memory management system and method of the present invention creates a new memory tuple that creates both a handle as well as a reference to an item within the handle. In the latter case, the reference is created using an offset value that defines the physical offset of the data within the memory block. If references are passed in terms of their offset value, this value will be the same in any copy of the handle regardless of the machine. In the context of a distributed computing environment, all that then remains is to establish the equivalence between handles, which can accomplished in a single transaction between two communicating machines. Thereafter, the two machines can communicate about specific handle contents simply by using offsets.
The minimum reference is therefore a tuple comprised of the handle together with the offset into the memory block, we shall call such a tuple an 'ET_ViewRef and sample code used to create such a tuple 100 in C is provided in Figure 1. Once this tuple has been created, it becomes possible to use the ETJViewRef structure as the basic relocatable handle reference in order to reference structures internal to the handle even when the handle may move. The price for this flat memory model is the need for a wrapper layer that transparently handles the kinds of manipulations described above during all de-referencing operations, however, even with such a wrapper, operations in this flat memory model are considerably faster that corresponding OS supplied operations on the application heap.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 illustrates sample code used to create the minimum reference 'tuple' of the . present invention;
Figure 2 illustrates a drawing convention that is used to describe the interrelationship between sub-layers in one embodiment of the present invention;
Figure 3 illustrates a sample header block that may be used to practice the- present invention;
Figure 4 illustrates a simple initial state for a handle containing multiple structures;
Figure 5 illusfrates the type of logical relationships that may be created between structures in a handle following the addition of a new structure;
Figure 6 illustrates a sample of a handle after increasing the size of a given structure within the handle beyond its initial physical memory allocation;
Figure 7 illustrates the manner in which a handle could be adapted to enable unlimited growth to a given structure within the handle;
Figure 8 illustrates the handle after performing an undo operation;
Figure 9 illustrates a handle that has been adapted to include a time axis in the header field of the structures within the handle;
Figure 10 illustrates the manner in which the present invention can be used to store data as a hierarchical tree; and
Figure 11 illusfrates the process for using the memory model to sort structures within a handle. DETAILED DESCRIPTION
Descriptive Conventions
In order to graphically describe the architectural components and interrelations that comprise the software, this document adopts a number of formalized drawing conventions. In general, any given software aspect is built upon a number of sub-layers. Referring now to figure 2, a block diagram is provided that depicts these sub-layers as a 'stack' of blocks. The lowest block is the most fundamental (generally the underlying OS) and the higher block(s) are successive layers of abstraction built upon lower blocks. Each such block is referred to interchangeably as either a module or a package.
The first, an opaque module 200, is illustrated as a rectangular in Figure 2A. An opaque module 200 is one that cannot be customized or altered via registered plug-ins. Such a form generally provides a complete encapsulation of a given area of functionality for which customization is either inappropriate or undesirable.
The second module, illustrated as T-shaped form 210 in Figure 2B, represents a module that provides the ability to register plug-in functions that modify its behavior for particular purposes. In Figure 2A, these plug-ins 220 are shown as 'hanging' below the horizontal bar of the module 210. In such cases, the module 210 provides a complete 'logical' interface to a certain functional capability while the plug-ins 220 customize that functionality as desired. In general, the plug-ins 220 do not provide a callable API of their own. This methodology provides the benefits of customization and flexibility without the negative effects of allowing application specific knowledge to percolate any higher up the stack than necessary. Generally, most modules provide a predefined set of plug-in behaviors so that for normal operation they can be used directly without the need for plug-in registration.
In any given diagram, the visibility of lower layers as viewed from above, implies that direct calls to that layer from higher-level layers above is supported or required as part of normal operation. Modules that are hidden vertically by higher-level modules, are not intended to be called directly in the context depicted. Figure 2C illustrates this descriptive convention. Module 230 is built upon and makes use of modules 235, 240, and 245 (as well as what may be below module 245). Module 230, 235 and 240 make use of module 245 exclusively. The functionality within module 240 is completely hidden from higher level modules via module 230, however direct access to modules 250 and 235 (but not 245) is still possible.
In Figure 2D, the Viewstructs memory system and method 250 is illustrated. The ViewStructs 250 package (which implements the memory model described herein) is layered directly upon the heap memory encapsulation 280 provided by the TBFilters 260, TrapPatches 265, and WidgetQC 270 packages. These three packages 260, 265, 270 form the heap memory abstraction, and provide sophisticated debugging and memory tracking capabilities that are discussed elsewhere. When used elsewhere, the terms ViewStructs or memory model apply only to the contents of a single handle within the heap.
To reference and manipulate variable sized structures within a single memory allocation, we require that all structures start with a standard header block. A sample header block (called an ETJHdr) may be defined in C programming language as illustrated in Figure 3. For the purpose of discussing the memory model, we shall only consider the use of ET Offset fields 310, 320, 330, 340. The word 'flags' 305, among other things, indicates the type of record follows the ET_Hdr. The 'version' 350 and 'date' fields 360 are associated with the ability to map old or changed structures into the latest structure definition, but these fields 350, 360 are not necessary to practice the invention and are not discussed herein.
Referring now to Figure 4, Figure 4 illustrates a simple initial state for a handle containing multiple structures. The handle contains two distinct memory structures, structure 410 and structure 420. Each structure is preceded by a header record, as previously illustrated in Figure 3, which defines its type (not shown) and its relationship to other structures in the handle. As can be seen from the diagram, the 'Nextltem' field 310 is simply a daisy chain where each link simply gives the relative offset from the start of the referencing structure to the start of the next structure in the handle. Note that all references in this model are relative to the start of the referencing structure header and indicate the (possibly scaled) offset to the start of the referenced structure header. The final structure in the handle is indicated by a header record 430 with no associated additional data where 'Nextltem = 0'. By following the 'Nextltem' daisy chain it is possible to examine and locate every structure within the handle. As the figure illustrates, the 'parent' field 340 is used to indicate parental relationship's between different structures in the handle. Thus we can see that stracture B 420 is a child of structure A 410. The terminating header record 430 (also referred to as an ET_Null record) always has a parent field that references the immediately preceding structure in the handle. Use of the parent field in the terminating header record 430 does not represent a "parent" relationship, it is simply a convenience to allow easy addition of new records to the handle. Similarly, the otherwise meaningless 'moveFrpm' field 330 for the first record in the handle contains a relative reference to the final ET_Null. This provides an expedient way to locate the logical end of the handle without the need to daisy chain through the 'nextltem' fields for each structure. . .
Referring now to Figure 5, Figure 5 illustrates the logical relationship between the structures after adding a third structure C 510 to the handle. As shown in Figure 5, structure C 510 is a child of B 420 (grandchild of A 410). The insertion of the new structure involves the following steps:
1) If necessary, grow the handle to make room for C 510, C's header 520, and the trailing ET_Null record 430;
2) Overwrite the previous ETJMull 430 with the header and body of structure C 510.
3) Set up C's parent relationship. In the illustrated example, structure C 510 is a child of B 420, which is established by pointing the 'parent' field of C's header file 520 to the start of structure B 420.
4) Append a final ETJSTull 530, with parent referenced to C's header 520.
5) Adjust the 'moveFrom' field 330 to reflect the offset of the new terminating ET_Null 530.
In addition to adding structures, the present invention must handle growth within existing structures. If a structure, such as structure B 420, needs to grow, it is often problematic since there may be another structure immediately following the one being grown (structure C 510 in the present illustration). Moving all trailing structures down to make enough room for the larger B 420 is one way to resolve this issue but this solution, in addition to being extremely inefficient for large handles, destroy, the integrity of the handle contents, as the relative references within the original B structure 420 would be rendered invalid once such a shift had occurred. The handle would then have to be scanned looking for such references and altering them. The fact that structures A 410, B 420, and C 510 -will generally contain relative references over and above those in the header portion make this impractical without knowledge of all stractures that might be part of the handle. In a dynamic computing environment such knowledge would rarely, if ever, be available, making such a solution impractical and in many cases impossible.
For these reasons, the header for each structure further includes a moveFrom and moveTo fields. Figure 6 illustrates the handle after growing B 420 by adding the enlarged B' structure 610 to the end of the handle. As shown, the original B structure 420 remains where it is and all references to it (such as the parent reference from C 510) are unchanged. B 420 is now referred to as the "base record" whereas B' 610 is the "moved record". Whenever any reference is resolved now, the process of finding the referenced pointer address using C code is:
src = address of referencing structure header dst = src + ET_Offset value for the reference if ( dst->moveTo ) dst = dst + dst->moveTo — follow the move
Further whenever a new reference is created, the process of finding the referenced pointer using C code is:
src = address of referencing structure header dst= address of referenced structure header if ( dst->moveFrom ) dst = dst + dst->moveFrom; ref value = dst - src
Thus, the use of the'moveto and movefrom fields ensures that no references become invalid, even when stractures must be moved as they grow.
Figure 7 illustrates the handle when B 420 must be further expanded into B" 710. In this case the 'moveTo' of the base record 420 directly references the most recent version of the structure, in this example B" 710. Correspondingly, the record B" 710 now has a 'moveFrom' 720 field that references the base record 420. B's moveFrom 720 still refers back to B 420 and indeed if there were more intermediate records between B 420 and B" (such as B' 610 in this example) the 'moveTo' and 'moveFrom' fields for all of the records 420, 610, 710 would form a doubly linked list. Once each of these records 420, 610, 710 have been linked, it is possible to re-trace through all previous versions of a structure using these links. For example, one could find all previous versions of the record starting with B" 710 by following the 'movefrom' field 720 to the base record 420 and then following the 'nextltem' link of each record until a record with a 'moveFrom' referencing the base record 420 is found. Alternatively, and perhaps more reliably, one could look for structures whose 'moveTo' field references record 420 and then work backward through the chain to find earlier versions.
This method, in which the last 'grown' structure moves to the end of the handle, has the beneficial effect that the same stracture is often grown many times in sequence and in these cases we can optionally avoid creating a series of intermediate 'orphan' records. References occurring from within the bodies of stractures may be treated in a similar manner to those described above and thus by extrapolation one can see that arbitrarily complex collections of cross-referencing structures can be created and maintained in this manner all within a single 'flat' memory allocation.
The price for this flat memory model is the need for a wrapper layer that transparently handles the kinds of manipulations described above during all de-referencing operations, however, even with such a wrapper, operations in this flat memory model are considerably faster that corresponding OS supplied operations on the application heap. Regardless of complexity, a collection of cross-referencing structures created using this approach is completely 'flat' and the entire 'serialization' issue is avoided when passing such collections between processors. This is a key requirement in a distributed data-flow based environment.
In addition to providing the ability to grow and move structures without impacting the references in other structures, another advantage of the 'moveTo'/'moveFrom' approach is inherent support for 'undo'. FIGURE 8 illustrates the handle after performing an 'undo' on the change from B' to B". The steps involved for 'undo' are provided below:
src = base record (i.e., B) dst = locate 'moved' record (i.e. B") by following 'moveTo' of base record prev = locate last record in handle whose 'moveTo' references dst src->moveTo = prev - src;
The corresponding process for 'redo' (which restores the state to that depicted after B" was first added) is depicted below: src = base record (i.e., B) dst = locate 'moved' record (i.e. B') by following 'moveTo' of base record if ( dst->moveTo ) nxt = dst + dst->moveTo src->moveTo = nxt - src ;
This process works because of the fact that 'moveTo' fields are only followed once when referencing via the base record. The ability to trivially perform undo/redo operations is very useful in situations where the structures involved represent information being edited by the user, it is also an invaluable technique for handling the effects of a time axis in the data.
One method for maintaining a time axis is by using a date field in the header of each structure. In this situation, the undo/redo mechanism can be combined with a 'date' field 910 in the header that holds the date when the item was actually changed. This process is illustrated in Figure 9 (some fields have been omitted for clarity).
This time axis can also be used to track the evolution of data over time. Rather than using the 'moveTo' fields to handle growing structures, the 'moveTo' fields could be used to reference future iterations of the data. For example, the base record could specify that it stores the high and low temperatures for a given day in Cairo. Each successive record within that chain of stractures could then represent the high and low temperatures for a given date 910, 920, 930, 940. By using the 'date' fields 910, 920, 930, 940 in this fashion, the memory system and method can be used to represent and reference time-variant data, a critical requirement of any system designed to monitor, query, and, visualize information overtime. Moreover, this ability to handle time variance exists within the 'flat' model and thus data can be distributed throughout a system while still retaining variance information. This ability lends itself well to such things as evolving simulations, database record storage and transaction rollback, and animations.
Additionally, if each instance of a given data record represents a distinct version of the data designed for a different 'user' or process, this model can be used to represent data having multiple values depending on context. To achieve this, whatever variable is driving the context is simply used to set the 'moveTo' field of the base record, much like time was used in the example above. This allows the model to handle differing security privileges, data whose value is a function of external variables or state, multiple distinct sources for the same datum, configuration choices, user interface display options, and other multi-value situations. A 'flags' field could also be used in the header record and can be used to provide additional flexibility and functionality within the memory model. For example, the header could include a 'flag' field that is split into two parts. The first portion could contain arbitrary logical flags that are defined on a per-record type basis. The second portion could be used to define the stracture type for the data that follows the header. While the full list of all possible stracture types is a matter of implementation, the following basic types are ■ examples of types that may be used and will be discussed herein:
kNullRecord - a terminating NULL record, described above. kStringRecord - a 'C format variable length string record.
• • kSimplexRecord - a variable format/size record whose contents is described by a type-id. kComplexRecord - a 'collection' element description record (discussed below) kOrphanRecord - a record that has been logically deleted/orphaned and no longer has any meaning.
By examining the structure type field of a given record, the memory wrapper layer is able to determine 'what' that record is and more importantly, what other fields exist within the record itself that also participate in the memory model, and must be handled by the wrapper layer. The following definition describes a structure named 'kComplexRecord' and will be used to illustrate this method:
typedef struct ET_Complex // Collection element record
1
ET_Hdr hdr; // Standard header
ET_Offset /.* ET_SimplexPtr */ valueR; .// value reference
ET TypelD typelD; // ID of this type
ET_Offset /* ET_ComplexPtr */ nextElem; // next elem. link
ET_Offset /* ET_ComplexPtr */ prevElem; . // prev. elem. link
ET_Offset /* ET_ComplexPtr */ childHdr; // First child link
ET_Offset /* ET_ComplexPtr */ childTail; // Last child link
} ET_Complex
The structure defined above may be used to create arbitrary collections of typed data and to navigate around these collections. It does so by utilizing the additional ET Offset fields listed above to create logical relationships between the various elements within the handle. Figure 10 illustrates the use of this structure 1010 to represent a hierarchical tree 1020. The ET Complex structure defined above is sufficiently general, however, that virtually any collection metaphor can be represented by it including (but not limited to) arrays (multi-dimensional), stacks, rings, queues, sets, n-trees, binary trees, linked lists etc. The 'moveTo', 'moveFrom' and 'nextltem' fields of the header have been omitted for clarity. The 'valueR' field would contain a relative reference to the actual value associated with the tree node (if present), which would be contained in a record of type ET_S implex. The type ID of this record would be specified in the 'typelD' field of the ET_Complex and, assuming the existence of an infrastructure for converting type IDs to a corresponding type and field arrangement, this could be used to examine the contents of the value (which could further contain ET_Offset fields as well).
As Figure 10 illustrates, 'A' 1025 has only one child (namely 'B' 1030), both the 'childHdr' 1035 and 'childTail' 1040 fields reference 'B' 1030, this is in contrast to the 'childHdr' 1045 and 'childTail' 1070 fields of 'B' 1030 itself which reflect the fact that 'B' 1030 has three children 1050, 1055, 1060. To navigate between children 1050, 1055, 1060, the doubly-linked 'nextltem' and 'prevltem' fields are used. Finally the 'parent' field from the standard header is used to represent the hierarchy. It is easy to see how simply by manipulating the various fields of the ET_Complex structure, arbitrary collection types can be created as can a large variety of common operations on those types. In the example of the tree above, operations might include pruning, grafting, sorting, insertion, rotations, shifts, randomization, promotion, demotion etc. Because the ET_Complex type is 'known' to the wrapper layer, it can transparently handle all the manipulations to the ET_Offset fields in order to ensure referential integrity is maintained during all such operations. This ability is critical to situations where large collections of disparate data must be accessed and distributed (while maintaining 'flatness') throughout a system.
Figure 11 illustrates the process for using the memory model to "sort" various structures. A sample structure, named ETjString 1100, could be defined in the following manner (defined below) to perform sorting on variable sized stractures: typedef struct ET String // String Structure
{
ET Hdr hdr; // Standard header
ET_Offset /* ET_StringPtr */ nextString; // ref. to next string char . theString [ 0 ] ; // C string (size varies)
} ET_String; Prior to the sort, the 'nextString' fields 1110^ 1115, 1120, 1125 essentially track the 'nextltem' field in the header, indeed 'un-sort' can be trivially implemented by taking account of this fact. By accessing the strings in such a list by index (i.e., by following the 'nextString' field), users of such a 'string list' abstraction can manipulate collections of variable sized strings. When combined with the ability to arbitrarily grow the string records as described previously (using 'moveTo' and 'moveFrom'), a complete and generalized string list manipulation package is relatively easy to implement. The initial 'Start' reference 1130 in such a list must obviously come from a distinct record, normally the first record in the handle. For example, one could define a special start record format for containers describing executable code hierarchies. The specific implementation of these 'start' records are not important. What is important, however, is that each record type contain a number of ET_Offset fields that can be used as references or 'anchors' into whatever logical collection(s) is represented by the other records within the handle.
The process of deleting a stracture in this memory model relates not so much to the fields of the header record itself, but rather to the fields of the full structure and the logical relationships between them. In other words, the record itself is not deleted from physical memory, rather it is logically deleted by removing from all logical chains that reference it. The specific manner in which references are altered to point "around" the deleted record will thus vary for each particular record type. Figure 12 illustrates the situation after deleting "Dog" 1125 from the string list 1100 and 'C 1050from the tree 1020.
When being deleted, the deleted record is generally 'orphaned'. In order to more easily identify the record as deleted, a record may be set to a defined record type, such as 'kOrphanRecord'. This record type could be used during compression operations to identify those records that have been deleted. A record could also be identified as deleted by confirming that it is no longer referenced from any other stracture within the handle. Given the complete knowledge that the wrapper layer has of the various fields of the stractures within the handle, this condition can be checked with relative ease and forms a valuable double-check when particularly sensitive data is being deleted.
The compression process involves movement of higher structures down to fill the gap and then the subsequent adjustment of all references that span the gap to reduce the reference offset value by the size of the gap being closed during compression. Once again, the fact that the wrapper layer has complete knowledge of all the ET_Offset fields within the stractures in the handle make compression a straightforward operation.
The foregoing description of the preferred embodiment of the invention has been presented for the purposes of illustration and description. For example, the term "handle" throughout this description is addressed as it is currently used in the Macintosh OS. This term should not be narrowly construed to only apply to the Macintosh OS, however, as the method and system could be used to enhance any sort of memory management system. The descriptions of the header stractures should also not be limited to the embodiments described. While the defined header stractures provide examples of the stractures that may be used, the plurality of header structures that could in fact be implemented is nearly limitless. Indeed, it is the very flexibility afforded by the memory management system that serves as its greatest strength. For these reasons, this description is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. In particular due to the simplicity of the model/hardware based implementations can be envisaged. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.
A SYSTEM FOR EXCHANGING BINARY DATA Inventor: John Fairweather
BACKGROUND OF THE INVENTION
In most modern computer environments, such as programming languages, and applications, the programming language compiler itself performs the job of defining data structures and the types and the fields that make them up. That type information is compile- time determined. This approach has the advantage of allowing the compiler itself to detect many common programmer errors in accessing compound data structures rather than allowing such errors to occur at run-time where they are much harder to find. However, this approach is completely inadequate to the needs of a distributed and evolving system since it is impossible to ensure that the code for all nodes on the system has been compiled with a compatible set of type definitions and will therefore operate correctly. The problem is aggravated when systems from different vendors wish to exchange data and information since their type definitions are bound to be different and thus the compiler can give no help in the exchange. In recent years, technologies such as B2B suites and XML have emerged to try to facilitate the exchange of information between disparate knowledge representation systems by use of common tags, which may be used by the receiving end to identify the content of specific fields. If the receiving system does not understand the tag involved, the corresponding data may be discarded. These systems simply address the problem of converting from one 'normalized' representation to another, (i.e., how do I get it from my relational database into yours?) by use of a tagged, textual, intermediate form (e.g. XML). Such text-based markup-language approaches, while they work well for simple data objects, have major shortcomings when it comes to the interchange of complex multimedia and non- flat (i.e., having multiple cross-referenced allocations) binary data. Despite the 'buzz' associated with the latest data-interchange techniques, such systems and approaches are totally inadequate for addressing the kinds of problems faced by a system, such as an intelligence system, which attempt to monitor and capture ever-changing streams of unstructured or semi-structured inputs, from the outside world and derive knowledge, computability, and understanding from the data so gathered. The conversion of information, especially complex and multimedia information to/from a textual form such as XML becomes an unacceptable burden on complex information systems and is inadequate for describing many complex data interrelationships. This approach is the current state of the art. At a minimum, what is needed is an interchange language designed to describe and
APPENDIX 2 manipulate typed binary data at run-time. Ideally, this type information will be held in a 'flat' (i.e., easily transmitted) form and ideally is capable of being embedded in the data itself without impact on data integrity. The system would also ideally make use of the power of compiled strongly typed programming languages (such as C) to define arbitrarily interrelated and complex structures, while preserving the ability to use this descriptive power at run-time to interpret and create new types.
SUMMARY OF INVENTION
The present invention provides a strongly-typed, distributed, run-time system capable of describing and manipulating arbitrarily complex, non-flat, binary data derived from type descriptions in a standard (or slightly extended) programming language, including handling of type inheritance. The invention comprises four main components. First, a plurality of databases having binary type and field descriptions. The flat data-model technology (hereinafter "Claimed Database") described in Appendix 1 is the preferred model for storing such information because it is capable of providing a 'flat' (i.e., single memory allocation) representation of an inherently complex and hierarchical (i.e., including type inheritance) type and field set. Second, a run-time modifiable type compiler that is capable of generating type databases either via explicit API calls or by compilation of unmodified header files or individual type definitions in a standard programming language. This function is preferably provided by the parsing technology disclosed in Appendix 2 (hereinafter "Claimed Parser"). Third, a complete API suite for access to type information as well as full support for reading and writing types, type relationships and inheritance, and type fields, given knowledge of the unique numeric type ID and the field name/path. A sample API suite is provided below. Finally, a hashing process for converting type names to unique type IDs (which may also incorporate a number of logical flags relating to the nature of the type). A sample hashing scheme is further described below.
The system of the present invention is a pre-requisite for efficient, flexible, and adaptive distributed information systems. BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 provides a sample implementation of the data structure ETJField;
Figure 2 provides a sample code implementation of the data structure ETJType;
Figure 3 is a block diagram illustrating a sample type definition tree relating ETJType and ET_Field data structures; and
Figure 4 provides a sample embodiment of the logical flags that may be used to describe the typelD.
DETAILED DESCRIPTION OF THE INVENTION
The following description provides an overview of one embodiment of the invention. Please refer to the patent application incorporated herein for a more complete understanding of the Claimed Parser and Claimed Database.
All type information can be encoded by using just two structure variants, these are the 'ETJField' structure, which is used to describe the fields of a given type, and the 'ETJType' structure, which is used to described the type itself. Referring now to Figure 1, a sample implementation of the ETJField structure 100 is provided. The fields in the ETJField structure are defined and used as follows:
"hdr" 102 - This is a standard header record of type ETJHdr as defined in the Claimed Database patent application.
"typelD" 104 - This field, and the union that surrounds it, contain a unique 64-bit type ID that will be utilized to rapidly identify the type of any data item. The method for computing this type ID is discussed in detail below.
"fName"106 - This field contains a relative reference to an ET_String structure specifying the name of the field.
"fDesc" 108 - This field may contain a relative reference to an ETjString stracture containing any descriptive text associated with the field (for example the contents of the line comments in the type definitions above).
"fieldLink" 110 - This field contains a relative reference to the next field of the current type. Fields are thus organized into a link list that starts from the "fieldHDR" 220 field 220 of the type and passes through successive "fieldLink" 110 links 110 until there are no more fields.
"offset" 112 - This field contains the byte offset from the start of the parent type at which the field starts. This offset provides rapid access to field values at run-time. "unitID" 114 - This field contains the unique unit ID of the field. Many fields have units (e.g., miles-per-hour) and knowledge of the units for a given field is essential when using or comparing field values.
"bounds" 116 - For fields having array bounds (e.g., and array of char[80]), this field contains the first array dimension.
"bounds2" 118 - For two dimensional arrays, this field contains the second dimension. This invention is particularly well-adapted for structures of a higher dimensionality than two, or where the connections between elements of a structure is more complex that simple array indexing.
"fScript" 120 - Arbitrary and pre-defined actions, functions, and scripts may be associated with any field of a type. These 'scripts' are held in a formatted character string referenced via a relative reference from this field.
"f Annotation" 122 - In a manner similar to scripts, the text field referenced from this field can contain arbitrary annotations associated with the field. The use of these annotations will be discussed in later patents.
"flaglndex" 124 - It is often convenient to refer to a field via a single number rather than carrying around the field name. The field index is basically a count of the field occurrence index within the parent type and serves this purpose.
"fEchoField" 126- This field is associated with forms of reference that are not relevant to this patent and is not discussed herein.
"flaglndexTypelD" 128- In cases where a field is embedded within multiple enclosing parent types, the 'flaglndex' value stored in the field must be tagged in this manner to identify which ancestral enclosing type the index refers to.
Referring now to Figure 2, a sample embodiment of the ETJType stracture 200 is provided. The fields of the ETJType structure 200 are defined and used as follows:
"hdr" 202 - This is a standard header record of type ETJHdr as defined in the Claimed Database patent application. "typelD" 204 - This field, and the union that surrounds it, contain a unique 64-bit type ID that will be utilized to rapidly identify the type of any data item. The method for computing this type ID is discussed in detail below.
"name" 206 - This is a relative reference to a string giving the name of the type.
"edit", "display" 208 - These are relative references to strings identifying the "process" to be used to display/edit this type (if other than the default). For example the specialized process to display/edit a color might be a color-wheel dialog rather than a simple dialog allowing entry of the fields of a color (red,green,blue).
"description" 210- This is a relative reference to a string describing the type.
"ChildLink" 212 - For an ancestral type from which descendant types inherit, this field gives the relative reference to the next descendant type derived from the same ancestor. Type hierarchies are defined by creating trees of derived types. The header to the list of child types at any level is the "childHdr" field 218, the link between child types is the "ChildLink" field 212. Because types are organized into multiple type databases (as discussed later), there are two forms of such links: the local form and non-local form. The non-local form is mediated by type ID references, not relative references (as for the local form), and involves the fields "childlDLink" 236, "childlDHdr" 238, and "parentID" 240 (which hold the reference from the child type to its parent). The parent reference for the local form is held in the "parent" field of "hdr" 202.
"cTypedef ' 216 - This field may optionally contain a relative reference to a string giving the C language type definition from which the type was created.
"childHdr" 218 - This field contains the header to the list of child types at any level .
"fieldHDR" 220 - Fields are organized into a link list that starts from the this field.
"keywords" 222 - This field contains a relative reference to a string contain key words by which the type can be looked up.
"bounds" 224, "bounds2" 226 - array dimensions as for ETJField
"size" 228 - Total size of the type in bytes. "color" 230- To facilitate type identification in various situations, types may be assigned inheritable colors.
"filelndex" 232 - used to identify the source file from which the type was created.
"keyTypelD" 234 - This field is used to indicate whether this type is designated a "key" type. In a full data-flow based system, certain types are designated 'key' types and may have servers associated with them.
"nextKeyType" 246 - This field is used to link key types into a list.
"tScript" 242,"tAnnotation" 244 - These fields reference type scripts and annotations as for ET_Field l00.
"maxFieldlndex" 248 - This field contains the maximum field index value (see ETJField 100) contained within the current type.
"numFields" 250 - This gives the total number of fields within the current type.
To illustrate the application of these structures 100, 200 to the respresentation of types and the fields within them, consider the type definitions below whereby the types "Cat" and "Dog" are both descendant from the higher level type "Mammal" (denoted by the "::" symbol similar to C++ syntax).
typedef struct Mammal
{
RGBColor hairColor; int32 gestation; // in days
} Mammal;
typedef struct Dog: :Mammal
{ int32 barkVol; // in decibels
} Dog;
typedef struct Cat::Mammal
{ int32 purrVol; // in decibels
} Cat;
Because they are mammals, both Cat and Dog inherit the fields "hairColor" and "gestationPeriod" which means the additional fιeld(s) defined for each start immediately after the total of all inherited fields (from each successive ancestor). Referring now to Figure 3, this portion of the type definition tree when viewed as a tree of related ETJType 200 and ETJField 100 structures is shown. In this diagram, the vertical lines 305 linking the types 315, 320 are mediated via the "childHdr" 218 and "parent" 240 links. The horizontal line 310 linking Dog 320 and Cat 325 is mediated via "ChildLink" 242. Similarly for the field links 330, 335, 340, 345 within any given type, the fields involved are "parentID" 240, "fieldHDR" 220, and "fieldLink" 110. It is thus very obvious how one would navigate through the hierarchy in order to discover say all the fields of a given type. For example, the following sample pseudo code illustrates use of recursion to first process all inherited fields before processing those unique to the type itself.
void LoopOverFields (ETJType *aType)
{ if ( aType->hdr.parent )
LoopOverFields(aType->hdr.parent) for ( fieldPtr = aType->fieldHdr ; fieldPtr ; fieldPtr = fιeldPtr->fιeldLink )
— do something with the field
}
Given this simple tree structure in which type information is stored and accessed, it should be clear to any capable software engineer how to implement the algorithms setr forth in the Applications Programming Interface (API) given below. This API illustrates the nature and scope of one set of routines that provide full control over the run-time type system of this invention. This API is intended to be illustrative of the types of capabilities provided by the system of this invention and is not intended to be exhaustive. Sample code implementing the following defined API is provided in the attached Appendix A.
The routine TM_CruiseTypeHierarchyO recursively iterates through all the subtypes contained in a root type, call out to the provided callback for each type in the hierarchy. In the preferred embodiment, if the function 'callbackFunc' returns -1, this routine omits calling for any of that types sub-types.
The routine TM_Code2TypeDB0 takes a type DB code (or TypelD value) and converts it to a handle to the types database to which it corresponds (if any). The type system of this invention allows for multiple related type databases (as described below) and this routine determines which database a given type is defined in.
TMJEnitATypeDBO and TMJTermATypeDBO initialize and terminate a types database respectively. Each type DB is simply a single memory allocation utilizing a 'flat' memory model (such as the system disclosed in the Claimed Database patent application) containing primarily records of ETJType 100 and ETJField 200 defining a set of types and their inter-relationships.
TM_SaveATypeDB0 saves a types database to a file from which it can be re-loaded for later use.
TM_AlignedCopyO copies data from a packed structure in which no alignment rules are applied to a normal output structure of the same type for which the alignment rules do apply. These non-aligned stractures may occur when reading from files using the type manager. Different machine architectures and compilers pack data into structures with different rules regarding the 'padding' inserted between fields. As a result, these data structures may not align on convenient boundaries for the underlying processor. For this reason, this function is used to handle these differences when passing data between dissimilar machine architecture.
TM_FixByteOrdering0 corrects the byte ordering of a given type from the byte ordering of a 'source' machine to that of a 'target' machine (normally 0 for the current machine architecture). This capability is often necessary when reading or writing data from/to files originating from another computer system. Common byte orderings supported are as follows:
• kBigEndian — e.g., the Macintosh PowerPC
• kLittleEndian — e.g., the Intel x86 architecture
• kCurrentByteOrdering — current machine architecture TMJFindTypeDBO can be used to find the TypeDB handle that contains the definition of the type name specified (if any). There are multiple type DBs in the system which are accessed such that user typeDBs are consulted first, followed by system type DBs. The type DBs are accessed in the reverse order to that in which they were defined. This means that it is possible to override the definition of an existing type by defining a new one in a later types DB. Normally the containing typeDB can be deduced from the type ID alone (which contains an embedded DB index), however, in cases where only the name is known, this function deduces the corresponding DB. This routine returns the handle to containing type DB or NULL if not found. This invention allows for a number of distinct type DBs to co-exist so that types coming from different sources or relating to different functional areas may be self contained. In the preferred embodiment, these type DBs are identified by the letters of the alphabet ('A' to 'Z') yielding a maximum of 26 fixed type databases. In addition, temporary type databases (any number) can be defined and accessed from within a given process context and used to hold local or temporary types that are unique to that context. All type DBs are connected together via a linked list and types from any later database may reference or derive from types in an earlier database (the converse is not true). Certain of these type DBs may be pre-defined to have specialized meanings. A preferred list of type DBs that have specialized meanings as follows:
'A' - built-in types and platform Toolbox header files
'B' - GUI framework and environment header files
'C - Project specific header files
'D' - Flat data-model structure old-versions DB (allows automatic adaption to type changes)
'E' - Reserved for 'proxy' types
'F' - Reserved for internal dynamic use by the environment
T - Project specific ontology types
TM_GetTypeID0 retrieves a type's ID Number when given its name. If aTypeName is valid, the type ID is returned, otherwise 0 is returned and an error is reported. TM_IsKnownTypeNameO is almost identical but does not report an error if the specified type name cannot be found.
TM_ComputeTypeBaseIDO computes the 32-bit unique type base ID for a given type name, returning it in the most significant 32-bit word of a 64-bit ETJTypelD 104. The base ID is calculated by hashing the type name and should thus be unique to all practical purposes. The full typelD is a 64-bit quantity where the base ID as calculated by this routine forms the most significant 32 bits while a variety of logical flags describing the type occupy the least significant 32-bits. In order to ensure that there is a minimal probability of two different names mapping onto the same type ID, the hash function chosen in the preferred embodiment is the 32-bit CRC used as the frame check sequence in ADCCP (ANSI X3.66, also known as FIPS PUB 71 and FED-STD-1003, the U.S. versions of CCITT's X.25 link- level protocol) but with the bit order reversed. The FIPS PUB 78 states that the 32-bit FCS reduces hash collisions by a factor of 10Λ-5 over the 16-bit FCS. Any other suitable hashing scheme, however, could be used. The approach allows type names to be rapidly and uniquely converted to the corresponding type ID by the system. This is an important feature if type information is to be reliably shared across a network by different machines. The key point is that by knowledge of the type name alone, a unique numeric type ID can be formed which can then be efficiently used to access information about the type, its fields, and its ancestry. The other 32 bits of a complete 64-bit type ID are utilized to contain logical flags concerning the exact nature of the type and are provided in Appendix A.
Given these type flag definitions and knowledge of the hashing algorithm involved, it is possible to define constants for the various built-in types (i.e., those directly supported by the underlying platform from which all other compound types can be defined by accumulation). A sample list of constants for the various built in types is provided in Appendix A.
Assuming that the constant definitions set forth in Appendix A are used, it is clear that the very top of the type hierarchy, the built-in types (from which all other types eventually derive), are similar to that exposed by the C language.
Referring now to Figure 4, a diagrammatic representation of a built-in type is shown (where indentation implies a descendant type). Within the kUniversalType 405, the set of direct descendants includes kVoidType 410, kScalarType 415, kStractType 420, kUnionType 425, and kFunctionType 430. kScalarType also includes descendants for handling integers 435, descendants for handling real numbers 440 and descendants for handling special case scalar values 445. Again, this illustrates only one embodiment of built-in types that may be utilized by the present system.
The following description provides a detailed summary of some of the functions that may be used in conjunction with the present invention. This list is not meant to be exhaustive nor or many of these functions required (depending upon the functionality required for a given implementation). The pseudo code associated with these functions is further illustrated in attached Appendix A. It will be obvious to those skilled in the art how these functions could be implemented in code.
Returning now to Appendix A, a function TM_CIeanFieldNameO is defined which provides a standardized way of converting field names within a type into human readable labels that can be displayed in a Ul. By choosing suitable field names for types, the system can create "human readable" labels in the corresponding Ul. The conversion algorithm can be implemented as follows:
1) Convert underscores to spaces, capitalizing any letter that immediately follows the underscore
2) Capitalize the first letter
3) Insert a space in front of every capitalized letter that immediately follows a lower case letter
4) Capitalize any letter that immediately follows a '.' character (field path delimiter)
5) De-capitalize the first letter of any of the following filler words (unless they start the sentence):
"an","and","of',"the","or","to","is","as","a"
So for example:
"aFieldName" would become "A Field Name" as would "a_field_name"
"timeOfDay" would become "Time of Day" as would "time_of_day" A function, such as TM_AbbreveFieldNameO, could be used to provide a standardized way of converting field names within a type into abbreviated forms that are still (mostly) recognizable. Again, choosing suitable field names for types ensures both human readable labels in the corresponding Ul as well as readable abbreviations for other purposes (such as generating database table names in an external relational database system). The conversion algorithm is as follows:
1) The first letter is copied over and capitalized.
2) For all subsequent letters:
a) If the letter is a capital, copy it over and any 'numLowerCase' lower case letters that immediately follow it.
b) If the letter follows a space or an underscore, copy it over and capitalize it
c) If the letter is '.', '[', or ']', convert it (and any immediately subsequent letters in this set) to a single 'J character, capitalize the next letter (if any). This behavior allows this function to handle field paths.
d) otherwise disgard it
So for example:
"aFieldName" would become "j FiNa" as would "a_field_name" if 'numLowerCase' was 1, it would be 'AFieNam' if it were 2
"timeOfDay" would become "TiOfDa" as would "time of day" if 'numLowerCase' was 1, it would be 'TimOfDay' if it were 2
For a field path example:
"geog.city[3j\ population" would become "Ge_Ci_3JPo" if 'numLowerCase' was 1
Wrapper functions, such as TMJSetTypeEditO, TMjSetTypeDisplayO, TM_SetTypeConverterO, TM_SetTypeCtypedefO, TM_SetTypeKeyWordsO,TM_SetTypeDescriptionO , and TM_SetTypeColor(), may be used set the corresponding field of the ETJType structure 200. The corresponding 'get' functions are simply wrapper functions to get the same field. A function, TMjSetTypelconO, may be provided that sets the color icon ID associated with the type (if specified). It is often useful for Ul purposes to associate an identifiable icon with particular types (e.g., a type of occupation), this icon can be specified using TM SetTypelconO or as part of the normal acquisition process. Auto-generated Ul (and many other Ul context) may use such icons to aid in Ul clarity. Icons can also be inherited from ancestral types so that it is only necessary to specify an icon if the derived type has a sufficiently different meaning semantically in a Ul context. The function TM_GetTypeIconO returns the icons associated with a type (if any).
A function, such as TM_SetTypeKeyTypeO, may be used to associate a key data type (see TM_GetTypeKeyType) with a type manager type. By making this association, it is possible to utilize the full suite of behaviors supported for external APIs such as Database and Client-Server APIs, including creation and communication with server(s) of that type, symbolic invocation, etc. For integration with external APIs, another routine, such as TMJKeyTypeToTypelDOj may be used to obtain the type manager type ID corresponding to a given key data type. If there is no corresponding type ID, this routine returns zero.
Another function, TM_GetTypeNameO, may be used to get a type's name given the type ID number. In the preferred embodiment, this function returns using the 'aTypeName' parameter, the name of the type.
A function, such as TM FindTypesByKeywordO, may be used to search for all type DBs (available from the context in which it is called) to find types that contain the keywords specified in the 'aKeywordList' parameter. If matches are found, the function can allocate and return a handle to an array of type IDs in the 'thelDList' parameter and a count of the number of elements in this array as it's result. If the function result is zero, 'thelDList' is not allocated.
The function TM_GetTypeFileNameO gets the name of the header file in which a type was defined (if any).
Given a type ID, a function, such as TM_GetParentTypeIDO? can be used to get the ID of the parent type. If the given ID has no parent, an ID of 0 will be returned. If an error occurrs, a value of -1 will be returned. Another function, such as TM_IsTypeDescendantO, may be used to determine if one type is the same as or a descendant of another. The TM_IsTypeDescendant call could be used to check only direct lineage whereas TM_jAreTypesCompatible checks lineage and other factors in determining compatibility. If the source is a descendant of, or the same as, the target, TRUE is returned, otherwise F.ALSE is returned.
Another set of functions, hereinafter referred to as TMJTypelsPointerO, TMJTypelsHandleO, TMJTypelsRelRefO, TMJTypelsCoIIectionRefO, TMJTypelsPersistentRefOs maybe used to determine if a typelD represents a pointer/handle/relative etc. reference to memory or the memory contents itself (see typelD flag definitions). The routines optionally return the typelD of the base type that is referenced if the type ID does represent a pointer/handle/ref. In the preferred embodiment, when calling TM_TypeIsPtr(), a type ID that is a handle will return FALSE so the determination of whether the type is a handle, using a function such as TMJTypelsHandleO, could be checked first where both possibilities may occur. The function TMJTypelsReferenceO will return true if the type is any kind of reference. This function could also return the particular reference type via a paramter, such as the 'refType' parameter.
Another function, such as TMJTypesAreCompatibleO, may be used to check if the source type is the same as, or a descendant of, the target type. In the preferred embodiment, this routine returns:
+1 If the source type is a descendant of the target type (a legal connection)
-1 If the source type is a group type (no size) and the target is descended from it (also a legal connection)
0 Otherwise (an illegal connection)
If the source type is a 'grouping' type (e.g., Scalar), i.e., it has no size then this routine will return compatible if either the source is ancestral to the target or vice-versa. This allows for data flow connections that are typed using a group to be connected to flows that are more restricted.
Additional functions, such as TM_GetTypeSizeO and TM SizeOfO, could be applied in order to return the size of the specified data type. For example, TM_GetTypeSize() could be provided with an optional data handle which may be used to determine the size of variable sized types (e.g., strings). Either the size of the type could be returned or, alternatively, a 0 could be returned for an error. TM_SizeOf0 could be provided with a similar optional data pointer. It also could return the size of the type or 0 for an error.
A function, such as TM_GetTypeBoundsO> could be programmed to return the array bounds of an array type. If the type is not an array type, this function could return a FALSE indicator instead.
The function TM_GetArrayTypeElementOffset0 can be used to access the individual elements of an array type. Note that this is distinct from accessing the elements an array field. If a type is an array type, the parent type is the type of the element of that array. This knowledge can be used to allow assignment or access to the array elements through the type manager API.
The function TM_InitMem initializes an existing block of memory for a type. The memory will be set to zero except for any fields which have values which will be initialized to the appropriate default (either via annotation or script calls - not discussed herein). The function TM_NewPtrO allocates and initializes a heap data pointer. If you wish to allocate a larger amount of memory than the type would imply, you may specify a non-zero value for the 'size' parameter. The value passed should be TM_GetTypeSize(...) + the extra memory required. If a type ends in a variable sized array parameter, this will be necessary in order to ensure the correct allocation. The function TMJNewHdIO performs a similar function for a heap data handle. The functions TMJDisposePtrO and TMJDisposeHdlO may be used to de-allocate memory allocated in this manner.
The function TMJLocalFieldPathO can be used to truncate a field path to that portion that lies within the specified enclosing type. Normally field paths would inherently satisfy this condition, however, there are situations where a field path implicitly follows a reference. This path truncation behavior is performed internally for most field related calls. This function should be used prior to such calls if the possibility of a non-local field path exists in order to avoid confusion. For example:
typedef struct tl
{ char x[16]; } tl; typedef struct t2
{ tl y; } t2;
then TM_LocalFieldPath(,t2,"y.x[3]",) would yield the string "y".
Given a type ID, and a field within that type, TM_GetFieldTypeIDO will return the type ID of the aforementioned field or 0 in the case of an error.
The function TM_GetBuiltInAncestor returns the first built-in direct (i.e., not via a reference) ancestor of the type ID given.
Two functions, hereinafter called TM_GetIntegerVaIue and TM_GetReaIValueO, could be used to obtain integer and real values in a standardized form. In the preferred embodiment, if the specified type is, or can be converted to, an integer value, the TM GetlntegerValueO would return that value as the largest integer type (i.e., int64). If the specified type is, or can be converted to, a real value, TM_GetRealValue() would return that value the largest real type (i.e., long double). This is useful when code does not want to be concerned with the actual integer or real variant used by the type or field. Additional functions, such as TMjSetlntegerValueO and TMJSetRealValueO, could perform the same function in the opposite direction.
Given a type ID, and a field within that type, a function, hereinafter called TM_GetFieldContainerTypeH)0, could be used to return the container type ID of the aforementioned field or 0 in the case of an error. Normally the container type ID of a field is identical to 'aTypelD', however, in the case where a type inherits fields from other ancestral types, the field specified may actually be contributed by one of those ancestors and in this case, the type ID returned will be some ancestor of 'aTypelD'. In the preferred embodiment, if a field path is specified via 'aFieldName* (e.g., field l.field2) then the container type ID returned would correspond to the immediate ancestor of 'field2', that is 'fieldl'. Often these inner structures are anonymous types that the type manager creates during the types acquisition process. A function, hereinafter called TM_GetFieldSize , returns the size, in bytes, of a field, given the field name and the field's enclosing type; 0 is returned if unsuccessful.
A function, hereinafter called TM_IsLegalFieldPath , determines if a string could be a legal field path, i.e., does not contain any characters that could not be part of a field path. This check does not mean that the path actually is valid for a given type, simply that it could be. This function operates by rejecting any string that contains characters that are not either alphanumeric or in the set '[',']7J, or '.'. Spaces are allowed only between '[' and ']'.
Given an enclosing type ID, a field name, and a handle to the data, a function, hereinafter known as TM_GetFieIdValueH , could be used to copy the field data referenced by the handle into a new handle. In the preferred embodiment, it will return the handle storing the copy of the field data. If the field is an array of 'char', this call would append a terminating null byte. That is if a field is "char[4]" then at least a 5 byte buffer must be allocated in order to hold the result. This approach greatly simplifies C string handling since returned strings are guaranteed to be properly terminated. A function, such as TM_GetFieldVaIueP ? could serve as the pointer based equivalent. Additionally, a function such as TM_SetFieldValueO could be used to set a field value given a type ID, a field name and a binary object. It would also return an error code in an error.
A function, such as TMjSetCStringFieldValueO, could be used to set the C string field of a field within the specified type. This function could transparently handle logic for the various allowable C-string fields as follows:
1) if the field is a charHdl then:
a) if the field already contains a value, update/grow the existing handle to hold the new value
b) otherwise allocate a handle and assign it to the field
2) if the field is a charPtr then:
a) if the field already contains a value:
i) if the previous string is equal to or longer than the new one, copy new string into existing pointer ii) otherwise dispose of previous pointer, allocate a new one and assign it
b) otherwise allocate a pointer and assign it to the field
3) if the field is a relative reference then:
a) this should be considered an error. A pointer value could be assigned to such a field prior to moving the data into a collection in which case you should use a function similar to the TM_SetFieldValueO function described above.
4) if the field is an array of char then:
a) if the new value does not fit, report array bounds error
b) otherwise copy the value into the array
A function, such as TM_AssignToFieldO, could be used to assign a simple field to a value expressed as a C string. For example, the target field could be:
a) Any form of string field or string reference;
b) A persistent or collection reference to another type; or
c) Any other direct simple or structure field type. In this case the format of the C string given should be compatible with a call to TM_StringToBinary() (described above) for the field type involved. The delimiter for TM_StringToBinary is taken to be "," and the 'kCharArrayAsString' option (see TM_BinaryToString) is assumed.
In the preferred embodiment, the assignment logic used by this routine (when the 'kAppendStringValue' is present) would result in existing string fields having new values appended to the end of them rather than being overwritten. This is in contrast to the behavior of TM_SetCStringFieldValue() described above. For non-string fields, any values specified overwrite the previous field content with the exception of assignment to the 'aStringH' field of a collection or persistent reference with is appended if the 'kAppendStringValue' option is present. If the field being assigned is a collection reference and the 'kAppendStringValue' option is set, the contents of 'aStringPtr' could be appended to the contents of a string field. If the field being assigned is a persistent reference, the 'kAssignToRefType','kAssignToUniqueID' or 'kAssignToStringH' would be used to determine if the typelD, unique ID, or 'aStringH' field of the reference is assigned. Otherwise the assignment is to the name field. In the case of 'kAssignToRefType', the string could be assumed to be a valid type name which is first converted to a type ID. If the field is a relative reference (assumed to be to a string), the contents of 'aStringPfr' could be assigned to it as a (internally allocated) heap pointer.
Given an enclosing type ID, a field name, and a pointer to the data, a function such as TM_SetArrFieldValue could be used to copy the data referenced by the pointer into an element of an array field element into the buffer supplied. Array fields may have one, or two dimensions.
Functions, hereinafter named TM_GetCStringFieIdValueB » TM_GetCStringFieldValuePO and TM_GetCStringFieIdValueHO, could be used to get a C string field from a type into a buffer/pointer/handle. In the case of a buffer, the buffer supplied must be large enough to contain the field contents returned. In other cases the function or program making the call must dispose of the memory returned when no longer required. In the preferred embodiment, this function will return any string field contents regardless of how is actually stored in the type structure, that is the field value may be in an array, via a pointer, or via a handle, it will be returned in the memory supplied. If the field type is not appropriate for a C string, this function could optionally return FALSE and provide an empty output buffer.
Given an enclosing type ID, a field name, and a pointer to the data, the system should also include a function, hereinafter name TM_GetArrFieldVaIueP , that will copy an element of an array field element's data referenced by the pointer into the buffer supplied. Array fields may have one, or two dimensions.
Simple wrapper functions, hereinafter named TM GetFieldBoundsO, TM_GetFieIdOffset0, TM_GetFieldUnitsO, and TM_GetFieIdDescription(), could be provided in order to access the corresponding field in ET Field 100. Corresponding 'set' functions (which are similar) could also be provided.
The function TM ForAHFieldsLoopO is also provided that will iterate through all fields (and sub-fields) of a type invoking the specified procedure. This behavior is commonplace in a number of situations involving scanning the fields of a type. In the preferred embodiment, the scanning process should adhere to a common approach and as a result a function, such as this one, should be used for that purpose. A field action function takes the following form:
Boolean myActionFn ( // my field action function
ET TypeDBHdl aTypeDBHdl, // 1: Type DB (NULL to default)
ETJTypelD 104 aTypelD, // 1: The type ID
ETJTypelD 104 aContainingTypelD, // 1: containing Type ID of field anonPtr aDataPtr, // 1: The type data pointer anonPtr context, // IO:Use to pass custom context charPtr fieldPath, // LField path for field
ETJTypelD 104 aFieldTypelD, // I:Type ID for field int32 dimensionl, // LField array bounds 1 (0 if
N/A) int32 dimension2, // LField array bounds 2 (0 if
N/A) int32 fieldOffset, // LOffset of start of field int32 options, // LOptions flags anonPtr internalUseOnly // LFor internal use only
) // R:TRUE for success
In this example, fields are processed in the order they occur, sub-field calls (if appropriate) occur after the containing field call. If this function encounters an array field (1 or 2 dimensional), it behaves as follows:
a) The action function is first called once for the entire field with no field indexing specified in the path.
b) If the element type of the array is a structure (not a union), the action function will be invoked recursively for each element with the appropriate element index(es) reflected in the 'fieldPath' parameter, the appropriate element specific value in 'fieldOffset', and 0 for both dimensionl and dimension2.
This choice of behavior for array fields offers the simplest functional interface to the action function. Options are:
kRecursiveLoop -- If set, recurses through sub-fields, otherwise one-level only kDataPtrlsViewRef — The 'aDataPtr' is the address of an ET_ViewRef designating a collection element
A function, hereinafter referred to as TM_FieldNameExistsO, could be used to determine if a field with the given name is in the given type, or any of the type's ancestral types. If the field is found return it returns TRUE, otherwise it returns F.ALSE.
A function, hereinafter referred to as TM_GetNumberOfFields05 may be used to return the number of fields in a given structured type or a -1 in the case of an error. In the preferred embodiment, this number is the number of direct fields within the type, if the type contains sub-structures, the fields of these sub-structures are not counted towards the total returned by this function. One could use another function, such as
TM_ForAllFieldsLoop(),to count fields regardless of level with 'kRecursiveLoop' set true and a counting function passed for 'aFieldFn' (see TM_GetTypeMaxFlagIndex).
Another function, referred to as TM_GetFieIdFIagIndexO, can provide the 'flag index' for a given field within a type. The flag index of a field is defined to be that field's index in the series of calls that are made by the function TM_ForAllFieldsLoop() (described above) before it encounters the exact path specified. This index can be utilized as an index into some means of storing information or flags specific to that field within the type. In the preferred embodiment, these indeces include any field or type arrays that may be within the type. This function may also be used internally by a number of collection flag based APIs but may also be used by external code for similar purposes. In the event that TMJForAllFieldsLoopO calls back for the enclosing structure field before it calls back for the fields within this enclosing structure, the index may be somewhat larger than the count of the 'elementary' fields within the type. Additionally, because field flag indeces can be easily converted to/from the corresponding field path (see TMJFlaglndexToFieldPath), they may be a useful way of referring to a specific field in a variety of circumstances that would make maintaining the field path more cumbersome. Supporting functions include the following: TM_FieldOffsetToFlagIndex0 is a function that converts a field offset to the corresponding flag index within a type; TMJFlaglndexToFieldPathO is a function that converts a flag index to the corresponding field path within a type; and the function
TM_GetTypeMaxFlagIndexO returns the maximum possible value that will be returned by TM_GetFieldFlagIndex() for a given type. This can be used for example to allocate memory for flag storage. Another function, referred to as TM FieldNamesToIndeeesO, converts a comma seperated list of field names/paths to the corresponding zero terminated list of field indeces. It is often the case that the 'fieldNames' list references fields within the structure that is actually referenced from a field within the structure identified by 'aTypelD'. In this case, the index recorded in the index list will be of the referencing field, the remainer of the path is ignored. For this reason, it is possible that duplicate field indeces might be implied by the list of 'fieldNames' and as a result, this routine can also be programmed to automatically eliminate duplicates.
A function, hereinafter name TM_GetTypeProxy , could be used to obtain a proxy type that can be used within collections in place of the full persistent type record and which contains a limited subset of the fields of the original type. While TM_GetTypeProxy() could take a list of field indeces, the function TMJMakeTypeProxyFromFieldsO could be used to take a comma separated field list. Otherwise, both functions would be identical. Proxy types are all descendant of the type ETJHit and thus the first few fields are identical to those of ET Hit. By using these fields, it is possible to determine the original persistent value to which the proxy refers. The use of proxys enables large collections and lists to be built up and fetched from servers without the need to fetch all the corresponding data, and without the memory requirements implied by use of the referenced type(s). In the preferred embodiment, proxy types are formed and used dynamically. This approach provides a key advantage of the type system of this invention and is crucial to efficient operation of complex distributed systems. Proxy types are temporary, that is, although they become known tliroughout the application as soon as they are defined using this function, they exist only for the duration of a given run of the application. Preferably, proxy types are actually created into type database 'E' which is reserved for that purpose (see above). Multiple proxys may also be defined for the same type having different index lists. In such a case, if a matching proxy already exists in 'E', it is used. A proxy type can also be used in place of the actual type in almost all situations, and can be rapidly resolved to obtain any additional fields of the original type. In one embodiment, proxy type names are of the form:
typeNameJProxy_n
Where the (hex) value of 'n' is a computed function of the field index list. Another function that may be provided as part of the API, hereinafter called TMJMakeTypeProxyFromFilterO) can be used to make a proxy type that can be used within collections in place of the full persistent type record and which contains a limited subset of the fields of the original type. Preferably, the fields contained in the proxy are those allowed by the filter function, which examines ALL fields of the full type and returns TRUE to include the field in the proxy or FALSE to exclude the field. For more information concerning proxy types, see the discussion for the function
TMJVΪakeTypeProxyFrornFieldsO.The only difference between this function and the function TM_MakeTypeProxyFromFields() is that TM_MakeTypeProxyFromFields() expects a commma separated field list as a parameter instead of a filter function. Another function, TM_IsTypeProxyO, could be used to determine if a given type is a proxy type and if so, what original persistent type it is a proxy for. Note that proxy type values start with the fields of ET Hit and so both the unique ID and the type ID being referenced may be obtained more accurately from the value. The type ID returned by this function may be ancestral to the actual type ID contained within the proxy value itself. The type ETJHit may be used to return data item lists from servers in a form that allows them to be uniquely identified (via the _system and _id fields) so that the full (or proxy) value can be obtained from the server later. ET Hit is defined as follows:
typedef struct ETJHit // list of query hits returned by a server
{
OSType _system; // system tag unslnt64 _id; // local unique item ID
ETJTypelD 104 _type; // type ID int32 relevance; // relevance value 0..100
} ETJΪit;
The function TM_GetNthFieIdTypeO gets the type of the Nth field in a structure. TM_GetNthFieldNameO obtains the corresponding field name, and TM_GetNthFieIdOffset0 the corresponding field offset.
Another function that may be included within the API toolset is a function called TM_GetTypeChildren . Th s function produces a list of type IDs of the children of the given type. This function allocates a zero terminated array of ETJTypelD 104's and returns the address of the array in 'aChildlDList'; the type ID's are written into this array. If 'aChildlDList' is specified as NULL then this array is not allocated and the function merely counts the number of children; otherwise 'aChildlDList' must be the address of a pointer that will point at the typelD array on exit. A negative number is returned in the case of an error. In the preferred embodiment, various specialized options for omitting certain classes of child types are supported.
A function, hereinafter referred to as TM_GetTypeAncestors ? may also be provided that produces a list of type IDs of ancestors of the given type. This function allocates a zero terminated array of ETJTypelD 104 and returns the address of the array in 'ancesfrallDs1; the type ID's are written into this array. If 'ancesfrallDs' is specified as NULL then this array is not allocated and the function merely counts the number of ancestors; otherwise 'ancesfrallDs' must be the address of a pointer that will point at the typelD array on exit. The last item in the list is a 0, the penultimate item is the primal ancestor of the given type, and the first item in the list is the immediate predecessor, or parent, of the given type. The function TM_GetTypeAncestorPath produces a ':' seperated type path from a given ancestor to a descendant type. The path returned is exclusive of the type name but inclusive of the descendant, empty if the two are the same or 'ancestorlD' is not an ancestor or 'aTypelD'. The function TM_GetInheritanceChainO is very similiar to TM_GetTypeAncestors() with the following exceptions:
(1) the array of ancestor type ids returned is in reverse order with the primal ancestor being in element 0
(2) the base type from which the list of ancestors is determined is included in the array and is the next to last element (array is 0 terminated)
(3) the count of the number of ancestors includes the base type
In the preferred embodiment, this function allocates a zero terminated array of ETJTypelD 104's and returns the address of the array in 'inheritanceChainlDs'; the type ID's are written into this array. If 'inheritanceChainlDs' is specified as NULL then this array is not allocated and the function merely counts the number of types in the inheritance chain; otherwise 'inheritanceChainlDs' must be the address of a pointer that will point at the typelD array on exit. The last item in the list is 0, element 0 is the primal ancestor of the base type, and the next to last item in the list is the base type. The API could also include a function, hereinafter called TM_GetTypeDescendantsO, that is able to create a free collection whose root node is the type specified and whose branch and leaf nodes are the descendant types of the root. Each node in the tree is named by the type name and none of the nodes contain any data. Collections of derived types can serve as useful frameworks onto which various instances of that type can be 'hung' or alternatively as a navigation and/or browsing framework. The resultant collection can be walked using the collections API (discussed in a later patent). The function TM_GetTypeSiblingsO produces a list of type IDs of sibling types of the given type. This function allocates a zero terminated array of ETJTypelD 104's and returns the address of the array in 'aListOSibs', the type ID's are written into this array. If 'aListOSibs' is specified as NULL then this array is not allocated and the function merely counts the number of siblings; otherwise 'ancesfrallDs' must be the address of a pointer that will point at the typelD array on exit. The type whose siblings we wish to find is NOT included in the returned list. The function TM_GetNthChiIdTypeIDO gets the n'th child Type ID for the passed in parent. The function returns 0 if successful, otherwise it returns an error code.
The function TMJBinaryToStringO converts the contents of a typed binary value into a C string containing one field per delimited section. During conversion, each field in turn is converted to the equivalent ASCII string and appended to the entire string with the specified delimiter sequence. If no delimiter is specified, a new-line character is used. The handle, 'aStringHdl', need not be empty on entry to this routine in which case the output of this routine is appended to whatever is already in the handle. If the type contains a variable sized array as its last field (i.e., stufffj), it is important that 'aDataPtr' be a true heap allocated pointer since the pointer size itself will be used to determine the actual dimensions of the array. In the preferred embodiment, the following specialized options are also available:
kUnsignedAsHex — display unsigned numbers as hex
kCharArrayAsString — display char arrays as C strings
kShowFieldNames — prefix all values by fieldName:
kOneLevelDeepOnly — Do Not go down to evaluate sub-structures: An additional function, hereinafter referred to as TMjStringToBinaryO? may also be provided in order to convert the contents of a C string of the format created by TM_BinaryToString into the equivalent binary value in memory.
The API may also support calls to a function, hereinafter referred to as TMJLowestCommonAncestorO, which obtains the lowest common ancestor type ID for the two type IDs specified. If either type ID is zero, the other type ID is returned. In the event that one type is ancestral to the other, it is most efficient to pass it as the 'typeID2' parameter.
Finally, a function, referred to as TM DefϊneNewTypeO, is disclosed that may be used to define a new type to be added to the specified types database by parsing the C type definition supplied in the string parameter. In the preferred embodiment, the C syntax typedef string is preserved in its entirety and attached to the type definition created so that it may be subsequently recalled. If no parent type ID is supplied, the newly created type is descended directly from the appropriate group type (e.g., structure, integer, real, union etc.) the typedef supplied must specify the entire stracture of the type (i.e., all fields). If a parent type ID is supplied, the new type is created as a descendant of that type and the typedef supplied specifies only those fields that are additional to the parental type, NOT the entire type. This function is the key to how new types can be defined and incoφorated into the type system at run time and for that reason is a critical algorithm to the present invention. The implementation is based on the parser technology described in Claimed Parser patent application and the lexical analyzer technology (the'Oaimed Lexical Analyzer") as provided in Appendix 3. As set forth above, those pending applications are fully incoφorated herein. The reader is referred to those patents (as well as the Claimed Database patent application) for additional details. The BNF specification to create the necessary types parser (which inteφrets an extended form of the C language declaration syntax) is provided in Appendix A. The corresponding lexical analyzer specification is also provided in Appendix A.
As can be seen from the specifications in Appendix A, the types acquisition parser is designed to be able to inteφret any construct expressible in the C programming language but has been extended to support additional features. The language symbols associated with these extensions to to C are as follows:
script — used to associate a script with a type or field
annotation — used to associate an annotation with a type or field @ — relative reference designator (like '*' for a pointer)
@@ — collection reference designator
# — persistent reference designator
<on> — script and annotation block start delimiter
<no> — script and annotation block end delimiter
>< — echo field specification operator
In order to complete the types acquisition process, a 'resolver' function and at least one plug-in are provided. A pseudo code embodiment of one possible resolver is set forth in Appendix A. Since most of the necessary C language operations are already provided by the built-in parser plug-in zero, the only extention of this solution necessary for this application is the plug-in functionality unique to the type parsing problem itself. This will be referred to as plug-in one and the pseudo code for such a plug in is also provided in Appendix A.
The foregoing description of the preferred embodiments of the invention has been presented for the puφoses of illustration and description. For example, although described with respect to the C programming language, any programming language could be used to implement this invention. Additionally, the claimed system and method should not be limited to the particular API disclosed. The descriptions of the header structures should also not be limited to the embodiments described. While the sample pseudo code provides examples of the code that may be used, the plurality of implementations that could in fact be developed is nearly limitless. For these reasons, this description is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.
APPENDIX A Sample Code Logic for SC-Schedule View
ET_ViewHdl 3C_ScheduleView ( // schedule a view
ET_ViewHdl aView, // I: locked view handle ET_WidgetPtr force idget // I: idget to force, or
NULL
) // R:void
1 t vw = view widget (*aView) ; if ( ! (FLAGS (vw) & klsRunning) && ! (FLAGS (*aView) & kKillThisView) )
{ if ( view is the next in view starting up sequence )
1 res = SC_StartWidget (aView, w, YES) ; // check for potential to start if ( res ) // yes it will start SC_StartWidget (aView, w,N0) ; // start it!
}
} else // view is already running
{ wid = forceWidget if ( i//id ) // forced pick of a widget
SC _ScheduleANode (aView, wid) ; else
{ if ( ! (FLAGS (*aView) & kEventBasedSlot) ) // view event/normal flip-flop
{ // scan event pending list or ( wid = each item in view' s internal pending event list )
{ if ( ! (FLAGS (wid) & klsRunning) ) // non-running widget with events !
{ // can it be made to run if ( (wid->wFlags & kWidgetlsDeceased) )
{ // it just died! obliterate the offending event link to the widget report error break;
} tgt = wid; pwp,tgt = chain up to highest non-running ancestral widget stoppit = NO; // initialize to can run... cpin = get control output pin for widget cflow = connected internal control flow? if ( cflow ) stoppit = SC_CheckCtrlStop (cflow) ; if ( [stoppit )
{ // start containing compound rotate the view's pending list to avoid hang ups SCjStartWidget (aView, tgt,NO) ; // may start the ancestor FLAGS (*aView) |= kEventBasedSlot; return aView; } else if ( wid waiting for non-timer events? )
{ // time based events can wait ! cpin = get control intput pin for wid cflow = connected external control flow? if ( !SC_CheckCtrlStop (cflow) ) // ok, no control flow OR
TRUE
{ // viable- slot target SC_SetCurrentWidget (aView,wid) ; res = SC_ResumeWidget (aView, wid, YES) ; if ( res ) // resume previously running
{ rotate the pending list to avoid hang ups
FLAGS (*aView) |= kEventBasedSlot; return aView; } }
} } FLAGS (*aView) &= -kEventBasedSlot; // clear event based slot flag vw view widget (*aView) ; if ( vw- >wThreadID ) SC_StopCWidget (aView,vw) ;// propagate tokens thread el se { stoppit = NO; // initialize to can run... cpin = get control output pin for vw cflovϊ = connected internal control flow? if ( cflow ) stoppit = SC_CheckCtrlStop (cflow) ; else if (all output pin values available) // linear view widget stoppit = YES; // stop it and propagate tokens flags = FLAGS (vw) ; if ( stoppit ) SC_StopCWidget (aView,vw) ; // create/use dedicated thread el 3e // handle focus issues
{ // to make the Ul responsive wid = view focus widget (*aView) ; if ( ! (FLAGS (*aView) & kFocusBasedSlot) && ΞG->CurrentFocus == aView && wid &&
(wid->wFlags & kPriorityOnFocus) )
{
SC_ScheduleANode (aView, id) ; // give focus widget 1/2 the' slot 3
FLAGS (*aView) |= kFocusBasedSlot;
} else // This is the normal behavior
{ // not interfere with things
SC_ScheduleNode (aView,vw) ; // could'nt stop this one FLAGS (*aView) &= -kFocusBasedSlot; // try to stop its children
}
}
} } if ( (*aView) ->hdr. flags & kKillThisView ) // summat nasty, kill off the view
{ terminate (aView) ; aView = NULL;
} return aView;
Code and Logic for SC-Schedule Node
void SC_ScheduleNode // schedule a compound node/widget
ET_ViewHdl aView, // I: iew handle ET_WidgetPtr aWidP // I:widget record pointer
) // R:void
{ stoppit = NO; SC_SetCurrentWidget (aView,aWidP) ; flow = get header to token list for this widget pin = follow connected inputs list to find a consumer widget while ( pin ) // till no more connected pins
{ wid = parent of the pin is the widget it is attached to, ignore WEM objects if ( RECORD_TYPE (wid) == kWidgetRecord && wid 1= aWidP ) { // pin attached to contained widget flags = FLAGS (wid) ; if ( flags & klsAtomic ) // contained widget atomic?
{
SC_SetCurrentWidget ( 0 , wid) ; if ( SC_ScheduleANode (aView,wid) ) break;
} else // attached to a compound widget { // descend and look for atomics
SC_SetCurrentWidget (aView, wid) ; if ( flags & klsRunning ) // and it's running ?
{ cpin = get control intput pin for widget cflow = connected external control flow? if ( !SC_CheckCtrlStop (cflow) ) // no flow OR set to TRUE
{ if ( wid->wThreadID ) // propagate tokens thread
{ if ( !SC_StopCWidget (aView,wid) ) break; } else
{ stoppit = NO; // initialize to can cpin = get control output pin for widget cflow = connected internal control flow? if ( cflow ) stoppit = SC_CheckCtrlStop (cflow) ; else if (all output pin values available) stoppit = YES; // stop and propagate tokens flags = FLAGS (wid) ; if ( stoppit ) SC_StopCWidget (aView,wid) ; else SC_ScheduleNode (aView,wid) ; // recurse to children break; // break outta loop
}
}
} else if ( SC_StartWidget (aView, wid,NO) ) break; pin = follow link to next pin on flow }
SC_SetCurrentWidget (aView,aWidP) ; rotate cIpinList of flow to ensure no pin always gets to go first rotate token list for aWidP if necessary return;
Sample Code and Logic for SC-Schedule A Node
Boolean SC_ScheduleANode ( // schedule an atomic node/widget
ET_ViewHdl aView, // I:View handle ET_WidgetPtr aWidP // I:widget record pointer
) // Rr oid
I ret = NO;
SC_SetCurrentWidget (0,aWidP) ; flags = FLAGS (aWidP) ; if ( flags & klsRunning ) // is it running ? if ( aWidP not waiting on events | | waiting for a NULL event | | waiting on any event that has arrived | | waiting on timer events )
{ cpin = get control intput pin for widget cflow = connected external control flow? if ( !SC CheckCtrlStop (cflow) ) // no flow OR set to TRUE
{ // valid slot target... if ( SC ResumeWidget (aView,aWidP, NO) ) ret = YES;
}
} } else if ( ! (FLAGS (*aView) & kKillThisView) &&
SC_StartWidget (aView, aWidP,NO) ) ret = YES; // not running so start it return ret ; }
Sample Code and Logic for SC-Start Widget
Figure imgf000086_0001
if ( SC TimeToGobblelnputs (aWidP ... ) ) // this widget might supply if { SC_StartWidget (aView, cwidg, YES ) runnit = YES;
} pin = = follow the link to the next connect! ≥d pin
}
} } else runnit = YES; // if not "as needed" then run if ( runnit && ! justCheckin ) // start this one for real so... '
1 runnit = ( flags & klsAtomic ) // if atomic allocate thread etc
? SC_StartAwidget (aView, aWidP,N0) // otherwise compound so copy input
SC_StartCwidget (aView,aWidP) ; // tokens to internal flows
} return 2runnit // indicate success of start }
Widget Pin Access API
void PC _NumDataInputs ( // count widget input pins
ET_WidgetPtr p, // I:widget pointer, or
NULL intPtr nFormal , // 0:# of formal input pins intPtr nDegenerate // 0:# of degenerate input pins
); // Rr oid void PC _NumDataOutputs ( // count widget output pins
ET_WidgetPtr wp, // I :widget pointer, or
NULL intPtr nFormal , // 0:# of formal output pins intPtr nDegenerate //' 0:# of degenerate output pins
); // R:void
Handle PC_ _GetDataInput ( // gets a data input value
ET_WidgetPtr wp, // I: widget pointer, or
NULL char pin // I : input pin A-Z, a-z select
); // R:pin value or NULL
Handle PC_ _GetInputDefault ( // Get default input pin value
ET_WidgetPtr p, // I:widget pointer, or
NULL char pin // I : input pin A-Z, a-z select
); // R: default value, NULL if none
ETJType ID PC_ _GetDataInputType ( // get input pin type
ET_WidgetPtr p, // I:widget pointer, or
NULL char pin // I: input pin A-Z, a-z select
); ' // R:type ID, 0 if error
ETJTypelD PC_ _GetDataOutputType ( // get output pin type
. ET_WidgetPtr wp, // I:widget pointer, or
NULL char pin // I: output pin A-Z, a-z select
); // R:type ID, 0 if error
Boolean PC_SetDataInputType ( // set input pin type
ΞT_WidgetPtr p, // I :widget pointer, or
NULL char pin, // I : input pin A-Z, a-z select
ET_TypeID aTypelD // I:The type ID to set it to
); // RrTRUE for success Boolean PC__SetDataOutputType ( II set output pin type
ET_WidgetPtr wp, II I:widget pointer, or
NULL char pin, II I: output pin A-Z, a-z select
ETJTypelD aTypelD II I: The type ID to set it to
); II R:TRUE for success charHdl PC_ _GetDataInputName ( II get input pin name (if any)
ET_WidgetPtr wp, II I:widget pointer, or
NULL char pin II I: input pin A-Z, a-z select
); II R:pin name, NULL if error charHdl PC_ _GetDataOutputName ( II get output pin name
(if any)
ET_WidgetPtr wp, II I:widget pointer, or
NULL char pin II I:output pin A-Z, a-z select
); II R:pin name, NULL if error
Boolean PC_ _IsDataInputConnected ( II is input pin ext . connected?
ET_WidgetPtr wp, II I: widget pointer, or
NULL char pin II I: input pin A-Z, a-z select
); II R:TRUE if connected externally
Boolean PC_ _IsDataOutputConnected ( II is output pin ext. connected?
ET_WidgetPtr wp, II I:widget pointer, or
NULL char pin II I: output pin A-Z, a-z select
); II RrTRUE if connected externally
Boolean PC_ _DoesOutputHaveToken ( II output pin token present?
ET_WidgetPtr wp, II I:widget pointer, or
NULL char pin II I:output pin A-Z, a-z select
); II RrTRUE if has token
Boolean PC_ _SetDataOutput ( II writes a value to an output pin
ΞT_WidgetPtr wp, II I rwidget pointer, or
NULL char pin, II I r output pin A-Z, a-z select void *data, II I pointer to data to write long size II I size in bytes of data
, >; 1/ RrTRUE on success void PC_SetControlOutput ( II Alter control output state
ET_WidgetPtr wp, II I rwidget pointer, or
NULL
Boolean pinstate II I state TRUE (go)
/FALSE (stop)
); II R oid charHdl PC_GetInputFlowName ( II Get input flow name
(if any)
ET_WidgetPtr wp, II I widget pointer, or
NULL char pin II I r input pin A-Z, a-z select
); II Rrflow name or NULL
ETJTypelD PC_GetInputFlowType ( II Get input flow type ID
ET_WidgetPtr wp, II I rwidget pointer, or
NULL char pin II I input pin A-Z, a-z select
); II RrType ID of flow, 0 if none charHdl PC_GetOutputFlowName ( II Get output flow name
(if any)
ETJWidgetPtr wp, II I rwidget pointer, or
NULL char pin II I output pin A-Z, a-z select
>; II Rrflow name or NULL
ETJTypelD PC_GetOutputFlowType ( II Get output flow type
ID
ETJWidgetPtr wp, II I r widget pointer, or
NULL char pin II I r output pin A-Z, a-z select
); II RrType ID of flow, 0 if none
Boolean PCJDoesInputExist ( II determine if input pin exists
ET_WidgetPtr wp, II I: idget pointer, or
NULL char pin II I r input pin A-Z, a-z select
>; II RrTRUE if input exists
Boolean PC_DoesOutputExist ( II determine if output pin exists
ETJWidgetPtr wp, II I rwidget pointer, or
NULL char pin II I output pin A-Z, a-z select
); II RrTRUE if output exists Handle PC_GetStaticDataInput ( // get input value
(tokenless)
ET_WidgetPtr wp, // I widget pointer, or
NULL char pin // I r input pin A-Z, a-z select
); // R value handle or NULL

Claims

1) A system for implementing large-scale distributed data-flow based applications comprising the following:
a) A data-flow based scheduling environment, for managing the execution of one or more control-flow based functional building blocks based on one or more rules of data flow;
b) A visual programming environment, wherein such environment provides the ability to build and control the flow of data collections between small control- flow based functional building-blocks such as widgets within the scheduling environment;
c) A pin-based API that provides access to contents from the executing code within the widgets;
d) A strongly-typed run-time accessible type system; and
e) One or more building block widgets that perform one or more actions in response to data-flow arriving at widget input pins.
2) The system of claim 1, wherein the data-flow based scheduling environment includes one or more scheduler routines, wherein such routines help balance the needs of data initiated program execution with considerations such as user responsiveness.
3) The system of claim 1, wherein the data-flow based scheduling environment includes one or more scheduler routines, wherein such routines help balance the needs of data initiated program execution with considerations such as widget hierarchy.
4) The system of claim 1, wherein the building block widgets are network distributed building block widgets.
5) The system of claim 1, wherein the programming language supports the creation of the layout and specification of the visual appearance of the running widget(s) in a user interface 6) The system of claim 1, wherein each widget has one or more widget pins are interconnected via typed flows which transfer data from the output pin of the source to the input pin of the sink in a tokenized manner (i.e., data is consumed in the process).
7) The system of claim 1, wherein the visual programming environment can be used to develop one or more atomic widgets, such atomic widgets containing compiled executable code.
8) The system of claim 7, wherein the visual programming environment can be used to develop one or more compound widgets, such compound widgets including an inner structure that defines any subordinate widgets that are required to implement the compound widget's functionality.
9) The system of claim 8, wherein one or more atomic widgets is embedded into a compound widget.
10) The system of claim 9, wherein the visual programming environment can be used to develop one or more widgets that are instantiated within container objects (views) which associate the user interface (e.g., windows) to widgets.
11) The system of claim 10, wherein the visual programming environment can be used to assign one or more priorities to a view level and those priorities can be used by the scheduling environment.
12) The system of claim 1, wherein one or more of the building block widgets include a confrol input pin that determines whether the widget will run.
13) The system If claim 12, wherein one or more of the building block widgets include a confrol output pin.
14) The system of claim 12, wherein any confrol flow connections between building block widgets are level-based and cannot be consumed.
15) The system If claim 1, wherein one or more of the building block widgets include formal inputs and outputs.
16) The system If claim 1, wherein one or more of the building block widgets include degenerate inputs and outputs. 17) The system If claim 1, wherein one or more of the building block widgets include degenerate inputs and outputs having default values.
18) The system of claim 8, wherein a compound widget includes one or more constants and one or more variables within its data-flow definition.
19) The system of claim 8, wherein a compound widget includes a specification of the types of values associated with any flow, pin, constant, or variable based on the types defined within the run-time type system.
20) The system of claim 8, further comprising a graphical run-time debugging environment that permits examination and alteration of the state of all typed data internal to any compound widgets or widget pins.
21) The system of claim 1, wherein the types system is the types system claimed in the Types Patent.
22) The system of claim 1, wherein the data stractures created by the visual programming environment use the memory model claimed in the Memory Patent.
23) The system of claim 1, wherein the data-flow based scheduling environment supports specification of 'OR' consumption that results in the consumption of a data token by the first widget that has inputs available for the data token.
24) The system of claim 23, wherein the data-flow based scheduling environment supports specification of 'AND' consumption that results in the consumption of a data token only when all connected widgets have run.
25) The system of claim 24, wherein the data-flow based scheduling environment does not permit a token to be added to a flow until the existing data token is consumed.
26) The system of claim 10, further comprising widget packs, such that each widget in a packet shares a common context but can independently execute in accordance with the scheduling environment.
27) The system of claim 10, wherein the scheduling environment can ran any widget to enable another widget to run according to the rules of data flow.
PCT/US2003/003032 2002-02-01 2003-02-03 A system and method for managing dataflows WO2003065171A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003210789A AU2003210789A1 (en) 2002-02-01 2003-02-03 A system and method for managing dataflows

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US35348702P 2002-02-01 2002-02-01
US60/353,487 2002-02-01

Publications (2)

Publication Number Publication Date
WO2003065171A2 true WO2003065171A2 (en) 2003-08-07
WO2003065171A3 WO2003065171A3 (en) 2004-02-05

Family

ID=27663215

Family Applications (12)

Application Number Title Priority Date Filing Date
PCT/US2003/003205 WO2003065179A2 (en) 2002-02-01 2003-02-03 A system and method for mining data
PCT/US2003/003066 WO2003065634A2 (en) 2002-02-01 2003-02-03 System and method for analyzing data
PCT/US2003/003157 WO2004002044A2 (en) 2002-02-01 2003-02-03 A system for exchanging binary data
PCT/US2003/003251 WO2003065180A2 (en) 2002-02-01 2003-02-03 System and method for creating a distributed network architecture
PCT/US2003/003085 WO2003065173A2 (en) 2002-02-01 2003-02-03 A system and method for managing knowledge
PCT/US2003/003151 WO2003065177A2 (en) 2002-02-01 2003-02-03 System and method for navigating data
PCT/US2003/003227 WO2003065240A1 (en) 2002-02-01 2003-02-03 System and method for managing collections of data on a network
PCT/US2003/003032 WO2003065171A2 (en) 2002-02-01 2003-02-03 A system and method for managing dataflows
PCT/US2003/003201 WO2003065213A1 (en) 2002-02-01 2003-02-03 System for automatic generation of software programs
PCT/US2003/003067 WO2003065252A1 (en) 2002-02-01 2003-02-03 System and method for managing memory
PCT/US2003/003110 WO2003065175A2 (en) 2002-02-01 2003-02-03 A system and method for real time interface translation
PCT/US2003/003068 WO2003065212A1 (en) 2002-02-01 2003-02-03 A system and method for parsing data

Family Applications Before (7)

Application Number Title Priority Date Filing Date
PCT/US2003/003205 WO2003065179A2 (en) 2002-02-01 2003-02-03 A system and method for mining data
PCT/US2003/003066 WO2003065634A2 (en) 2002-02-01 2003-02-03 System and method for analyzing data
PCT/US2003/003157 WO2004002044A2 (en) 2002-02-01 2003-02-03 A system for exchanging binary data
PCT/US2003/003251 WO2003065180A2 (en) 2002-02-01 2003-02-03 System and method for creating a distributed network architecture
PCT/US2003/003085 WO2003065173A2 (en) 2002-02-01 2003-02-03 A system and method for managing knowledge
PCT/US2003/003151 WO2003065177A2 (en) 2002-02-01 2003-02-03 System and method for navigating data
PCT/US2003/003227 WO2003065240A1 (en) 2002-02-01 2003-02-03 System and method for managing collections of data on a network

Family Applications After (4)

Application Number Title Priority Date Filing Date
PCT/US2003/003201 WO2003065213A1 (en) 2002-02-01 2003-02-03 System for automatic generation of software programs
PCT/US2003/003067 WO2003065252A1 (en) 2002-02-01 2003-02-03 System and method for managing memory
PCT/US2003/003110 WO2003065175A2 (en) 2002-02-01 2003-02-03 A system and method for real time interface translation
PCT/US2003/003068 WO2003065212A1 (en) 2002-02-01 2003-02-03 A system and method for parsing data

Country Status (4)

Country Link
US (14) US7240330B2 (en)
EP (1) EP1527414A2 (en)
AU (8) AU2003210803A1 (en)
WO (12) WO2003065179A2 (en)

Families Citing this family (1079)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5867153A (en) 1996-10-30 1999-02-02 Transaction Technology, Inc. Method and system for automatically harmonizing access to a software application program via different access devices
US7249344B1 (en) 1996-10-31 2007-07-24 Citicorp Development Center, Inc. Delivery of financial services to remote devices
US7668781B2 (en) * 1996-10-31 2010-02-23 Citicorp Development Center, Inc. Global method and system for providing enhanced transactional functionality through a customer terminal
US6493698B1 (en) * 1999-07-26 2002-12-10 Intel Corporation String search scheme in a distributed architecture
US20060116865A1 (en) 1999-09-17 2006-06-01 Www.Uniscape.Com E-services translation utilizing machine translation and translation memory
US20100185614A1 (en) 1999-11-04 2010-07-22 O'brien Brett Shared Internet storage resource, user interface system, and method
US6351776B1 (en) 1999-11-04 2002-02-26 Xdrive, Inc. Shared internet storage resource, user interface system, and method
US20010048448A1 (en) 2000-04-06 2001-12-06 Raiz Gregory L. Focus state themeing
US6753885B2 (en) 2000-04-06 2004-06-22 Microsoft Corporation System and theme file format for creating visual styles
US7313692B2 (en) 2000-05-19 2007-12-25 Intertrust Technologies Corp. Trust management systems and methods
US7000230B1 (en) 2000-06-21 2006-02-14 Microsoft Corporation Network-based software extensions
US8402068B2 (en) 2000-12-07 2013-03-19 Half.Com, Inc. System and method for collecting, associating, normalizing and presenting product and vendor information on a distributed network
US7904595B2 (en) 2001-01-18 2011-03-08 Sdl International America Incorporated Globalization management system and method therefor
US7406432B1 (en) 2001-06-13 2008-07-29 Ricoh Company, Ltd. Project management over a network with automated task schedule update
US7191141B2 (en) * 2001-06-13 2007-03-13 Ricoh Company, Ltd. Automated management of development project files over a network
JP3773426B2 (en) * 2001-07-18 2006-05-10 株式会社日立製作所 Preprocessing method and preprocessing system in data mining
US20030035582A1 (en) * 2001-08-14 2003-02-20 Christian Linhart Dynamic scanner
US7010779B2 (en) * 2001-08-16 2006-03-07 Knowledge Dynamics, Inc. Parser, code generator, and data calculation and transformation engine for spreadsheet calculations
US10489364B2 (en) * 2001-08-31 2019-11-26 Margaret Runchey Semantic model of everything recorded with UR-URL combination identity-identifier-addressing-indexing method, means and apparatus
US9189501B2 (en) * 2001-08-31 2015-11-17 Margaret Runchey Semantic model of everything recorded with UR-URL combination identity-identifier-addressing-indexing method, means, and apparatus
WO2003065179A2 (en) * 2002-02-01 2003-08-07 John Fairweather A system and method for mining data
US8527495B2 (en) * 2002-02-19 2013-09-03 International Business Machines Corporation Plug-in parsers for configuring search engine crawler
JP4047053B2 (en) * 2002-04-16 2008-02-13 富士通株式会社 Retrieval apparatus and method using sequence pattern including repetition
US6938239B2 (en) * 2002-04-18 2005-08-30 Wind River Systems, Inc. Automatic gopher program generator
US7359861B2 (en) * 2002-04-24 2008-04-15 Polyglot Systems, Inc. Inter-language translation device
US7210136B2 (en) * 2002-05-24 2007-04-24 Avaya Inc. Parser generation based on example document
US6996798B2 (en) * 2002-05-29 2006-02-07 Sun Microsystems, Inc. Automatically deriving an application specification from a web-based application
US7127520B2 (en) 2002-06-28 2006-10-24 Streamserve Method and system for transforming input data streams
US7840550B2 (en) * 2002-08-13 2010-11-23 International Business Machines Corporation System and method for monitoring database queries
US7376696B2 (en) * 2002-08-27 2008-05-20 Intel Corporation User interface to facilitate exchanging files among processor-based devices
US20080313282A1 (en) 2002-09-10 2008-12-18 Warila Bruce W User interface, operating system and architecture
JP4369708B2 (en) * 2002-09-27 2009-11-25 パナソニック株式会社 Data processing device
EP1406183A3 (en) * 2002-10-01 2004-04-14 Sap Ag Method and system for refreshing browser pages
US7913183B2 (en) * 2002-10-08 2011-03-22 Microsoft Corporation System and method for managing software applications in a graphical user interface
US7171652B2 (en) * 2002-12-06 2007-01-30 Ricoh Company, Ltd. Software development environment with design specification verification tool
JP4284497B2 (en) * 2003-01-29 2009-06-24 日本電気株式会社 Information sharing method, apparatus, and program
US9412141B2 (en) * 2003-02-04 2016-08-09 Lexisnexis Risk Solutions Fl Inc Systems and methods for identifying entities using geographical and social mapping
WO2004072797A2 (en) * 2003-02-07 2004-08-26 Safenet, Inc. System and method for determining the start of a match of a regular expression
US7451144B1 (en) * 2003-02-25 2008-11-11 At&T Corp. Method of pattern searching
US8271369B2 (en) * 2003-03-12 2012-09-18 Norman Gilmore Financial modeling and forecasting system
US7415672B1 (en) * 2003-03-24 2008-08-19 Microsoft Corporation System and method for designing electronic forms
US7370066B1 (en) 2003-03-24 2008-05-06 Microsoft Corporation System and method for offline editing of data files
US7913159B2 (en) 2003-03-28 2011-03-22 Microsoft Corporation System and method for real-time validation of structured data files
US7350191B1 (en) * 2003-04-22 2008-03-25 Noetix, Inc. Computer implemented system and method for the generation of data access applications
US7295852B1 (en) * 2003-05-01 2007-11-13 Palm, Inc. Automated telephone conferencing method and system
US7415484B1 (en) 2003-05-09 2008-08-19 Vignette Corporation Method and system for modeling of system content for businesses
US7660817B2 (en) * 2003-05-22 2010-02-09 Microsoft Corporation System and method for representing content in a file system
US7676486B1 (en) * 2003-05-23 2010-03-09 Vignette Software Llc Method and system for migration of legacy data into a content management system
US7404186B2 (en) * 2003-05-28 2008-07-22 Microsoft Corporation Signature serialization
JP2004362331A (en) * 2003-06-05 2004-12-24 Sony Corp Information processor and program
US7197746B1 (en) * 2003-06-12 2007-03-27 Sun Microsystems, Inc. Multipurpose lexical analyzer
US8095500B2 (en) 2003-06-13 2012-01-10 Brilliant Digital Entertainment, Inc. Methods and systems for searching content in distributed computing networks
GB0314593D0 (en) * 2003-06-23 2003-07-30 Symbian Ltd A method of enabling an application to access files stored on a storage medium
US7873716B2 (en) * 2003-06-27 2011-01-18 Oracle International Corporation Method and apparatus for supporting service enablers via service request composition
US20050015340A1 (en) * 2003-06-27 2005-01-20 Oracle International Corporation Method and apparatus for supporting service enablers via service request handholding
WO2005008440A2 (en) * 2003-07-11 2005-01-27 Computer Associates Think, Inc. System and method for common storage object model
US7406660B1 (en) 2003-08-01 2008-07-29 Microsoft Corporation Mapping between structured data and a visual surface
US8938595B2 (en) * 2003-08-05 2015-01-20 Sepaton, Inc. Emulated storage system
US7334187B1 (en) 2003-08-06 2008-02-19 Microsoft Corporation Electronic form aggregation
US7308675B2 (en) * 2003-08-28 2007-12-11 Ricoh Company, Ltd. Data structure used for directory structure navigation in a skeleton code creation tool
US7793257B2 (en) * 2003-08-28 2010-09-07 Ricoh Company, Ltd. Technique for automating code generation in developing software systems
US7237224B1 (en) 2003-08-28 2007-06-26 Ricoh Company Ltd. Data structure used for skeleton function of a class in a skeleton code creation tool
US7721254B2 (en) 2003-10-24 2010-05-18 Microsoft Corporation Programming interface for a computer platform
WO2005043356A2 (en) * 2003-10-30 2005-05-12 Lavastorm Technologies, Inc. Methods and systems for automated data processing
AU2004292680B2 (en) * 2003-11-28 2010-04-22 Canon Kabushiki Kaisha Method of constructing preferred views of hierarchical data
US7752603B2 (en) * 2003-12-08 2010-07-06 Notable Solutions, Inc. Systems and methods for data interchange among autonomous processing entities
US8548170B2 (en) 2003-12-10 2013-10-01 Mcafee, Inc. Document de-registration
US8656039B2 (en) 2003-12-10 2014-02-18 Mcafee, Inc. Rule parser
US7984175B2 (en) 2003-12-10 2011-07-19 Mcafee, Inc. Method and apparatus for data capture and analysis system
US7873541B1 (en) * 2004-02-11 2011-01-18 SQAD, Inc. System and method for aggregating advertising pricing data
US7430711B2 (en) * 2004-02-17 2008-09-30 Microsoft Corporation Systems and methods for editing XML documents
US20050192944A1 (en) * 2004-02-27 2005-09-01 Melodeo, Inc. A method and apparatus for searching large databases via limited query symbol sets
US8260764B1 (en) 2004-03-05 2012-09-04 Open Text S.A. System and method to search and generate reports from semi-structured data
US7983896B2 (en) 2004-03-05 2011-07-19 SDL Language Technology In-context exact (ICE) matching
US7966658B2 (en) * 2004-04-08 2011-06-21 The Regents Of The University Of California Detecting public network attacks using signatures and fast content analysis
US7627567B2 (en) * 2004-04-14 2009-12-01 Microsoft Corporation Segmentation of strings into structured records
US7398274B2 (en) * 2004-04-27 2008-07-08 International Business Machines Corporation Mention-synchronous entity tracking system and method for chaining mentions
US7539982B2 (en) * 2004-05-07 2009-05-26 International Business Machines Corporation XML based scripting language
US9038082B2 (en) 2004-05-28 2015-05-19 Oracle International Corporation Resource abstraction via enabler and metadata
US8073810B2 (en) * 2007-10-29 2011-12-06 Oracle International Corporation Shared view of customers across business support systems (BSS) and a service delivery platform (SDP)
US8321498B2 (en) * 2005-03-01 2012-11-27 Oracle International Corporation Policy interface description framework
US9565297B2 (en) 2004-05-28 2017-02-07 Oracle International Corporation True convergence with end to end identity management
US8966498B2 (en) * 2008-01-24 2015-02-24 Oracle International Corporation Integrating operational and business support systems with a service delivery platform
US9245236B2 (en) * 2006-02-16 2016-01-26 Oracle International Corporation Factorization of concerns to build a SDP (service delivery platform)
US8458703B2 (en) 2008-06-26 2013-06-04 Oracle International Corporation Application requesting management function based on metadata for managing enabler or dependency
US8266234B1 (en) 2004-06-11 2012-09-11 Seisint, Inc. System and method for enhancing system reliability using multiple channels and multicast
US7797333B1 (en) * 2004-06-11 2010-09-14 Seisint, Inc. System and method for returning results of a query from one or more slave nodes to one or more master nodes of a database system
WO2006002084A1 (en) * 2004-06-15 2006-01-05 Wms Gaming Inc. Gaming software providing operating system independence
US20060010122A1 (en) * 2004-07-07 2006-01-12 International Business Machines Corporation System and method for improved database table record insertion and reporting
US20060020501A1 (en) * 2004-07-22 2006-01-26 Leicht Howard J Benefit plans
US20060036451A1 (en) 2004-08-10 2006-02-16 Lundberg Steven W Patent mapping
US20060026174A1 (en) * 2004-07-27 2006-02-02 Lundberg Steven W Patent mapping
TWI272530B (en) * 2004-07-30 2007-02-01 Mediatek Inc Method for accessing file in file system, machine readable medium thereof, and related file system
US8560534B2 (en) 2004-08-23 2013-10-15 Mcafee, Inc. Database for a capture system
US7949849B2 (en) 2004-08-24 2011-05-24 Mcafee, Inc. File system for a capture system
US7440888B2 (en) * 2004-09-02 2008-10-21 International Business Machines Corporation Methods, systems and computer program products for national language support using a multi-language property file
US20060074836A1 (en) * 2004-09-03 2006-04-06 Biowisdom Limited System and method for graphically displaying ontology data
US20060053172A1 (en) * 2004-09-03 2006-03-09 Biowisdom Limited System and method for creating, editing, and using multi-relational ontologies
US20060074833A1 (en) * 2004-09-03 2006-04-06 Biowisdom Limited System and method for notifying users of changes in multi-relational ontologies
US20060053382A1 (en) * 2004-09-03 2006-03-09 Biowisdom Limited System and method for facilitating user interaction with multi-relational ontologies
US7496593B2 (en) 2004-09-03 2009-02-24 Biowisdom Limited Creating a multi-relational ontology having a predetermined structure
US20060053173A1 (en) * 2004-09-03 2006-03-09 Biowisdom Limited System and method for support of chemical data within multi-relational ontologies
US20060053171A1 (en) * 2004-09-03 2006-03-09 Biowisdom Limited System and method for curating one or more multi-relational ontologies
US20060053175A1 (en) * 2004-09-03 2006-03-09 Biowisdom Limited System and method for creating, editing, and utilizing one or more rules for multi-relational ontology creation and maintenance
US7505989B2 (en) 2004-09-03 2009-03-17 Biowisdom Limited System and method for creating customized ontologies
US20060053174A1 (en) * 2004-09-03 2006-03-09 Bio Wisdom Limited System and method for data extraction and management in multi-relational ontology creation
US7493333B2 (en) 2004-09-03 2009-02-17 Biowisdom Limited System and method for parsing and/or exporting data from one or more multi-relational ontologies
US8056008B2 (en) * 2004-09-14 2011-11-08 Adobe Systems Incorporated Interactive object property region for graphical user interface
US7719971B1 (en) 2004-09-15 2010-05-18 Qurio Holdings, Inc. Peer proxy binding
US20060059424A1 (en) * 2004-09-15 2006-03-16 Petri Jonah W Real-time data localization
EP1638336A1 (en) * 2004-09-17 2006-03-22 Korea Electronics Technology Institute Method for providing requested fields by get-data operation in TV-Anytime metadata service
US7406592B1 (en) * 2004-09-23 2008-07-29 American Megatrends, Inc. Method, system, and apparatus for efficient evaluation of boolean expressions
US7809536B1 (en) * 2004-09-30 2010-10-05 Motive, Inc. Model-building interface
US20060095480A1 (en) * 2004-10-29 2006-05-04 Microsoft Corporation Method and subsystem for performing subset computation for replication topologies
US7933868B2 (en) * 2004-11-04 2011-04-26 Microsoft Corporation Method and system for partition level cleanup of replication conflict metadata
US8010685B2 (en) * 2004-11-09 2011-08-30 Cisco Technology, Inc. Method and apparatus for content classification
US7936682B2 (en) * 2004-11-09 2011-05-03 Cisco Technology, Inc. Detecting malicious attacks using network behavior and header analysis
US20060106895A1 (en) * 2004-11-12 2006-05-18 Microsoft Corporation Method and subsystem for performing metadata cleanup for replication topologies
US20060117304A1 (en) * 2004-11-23 2006-06-01 Microsoft Corporation Method and system for localizing a package
US20060116912A1 (en) * 2004-12-01 2006-06-01 Oracle International Corporation Managing account-holder information using policies
US7383278B2 (en) * 2004-12-20 2008-06-03 Microsoft Corporation Systems and methods for changing items in a computer file
US7395269B2 (en) * 2004-12-20 2008-07-01 Microsoft Corporation Systems and methods for changing items in a computer file
US7552137B2 (en) * 2004-12-22 2009-06-23 International Business Machines Corporation Method for generating a choose tree for a range partitioned database table
US8032920B2 (en) * 2004-12-27 2011-10-04 Oracle International Corporation Policies as workflows
US7869989B1 (en) * 2005-01-28 2011-01-11 Artificial Cognition Inc. Methods and apparatus for understanding machine vocabulary
CN101536494B (en) 2005-02-08 2017-04-26 奥布隆工业有限公司 System and method for genture based control system
US7765219B2 (en) * 2005-02-24 2010-07-27 Microsoft Corporation Sort digits as number collation in server
US8103640B2 (en) * 2005-03-02 2012-01-24 International Business Machines Corporation Method and apparatus for role mapping methodology for user registry migration
US7643687B2 (en) * 2005-03-18 2010-01-05 Microsoft Corporation Analysis hints
CN1842081B (en) * 2005-03-30 2010-06-02 华为技术有限公司 ABNF character string mode matching and analyzing method and device
US9262056B2 (en) * 2005-03-30 2016-02-16 Ebay Inc. Methods and systems to browse data items
US20060235820A1 (en) * 2005-04-14 2006-10-19 International Business Machines Corporation Relational query of a hierarchical database
US20060241932A1 (en) * 2005-04-20 2006-10-26 Carman Ron C Translation previewer and validator
US7574578B2 (en) * 2005-05-02 2009-08-11 Elliptic Semiconductor Inc. System and method of adaptive memory structure for data pre-fragmentation or pre-segmentation
US7882116B2 (en) * 2005-05-18 2011-02-01 International Business Machines Corporation Method for localization of programming modeling resources
US20060271920A1 (en) * 2005-05-24 2006-11-30 Wael Abouelsaadat Multilingual compiler system and method
US20110153509A1 (en) 2005-05-27 2011-06-23 Ip Development Venture Method and apparatus for cross-referencing important ip relationships
US7822794B2 (en) * 2005-05-27 2010-10-26 Sanyo Electric Co., Ltd. Data recording apparatus and data file transmission method in data recording apparatus
US7975219B2 (en) * 2005-05-31 2011-07-05 Sorenson Media, Inc. Method, graphical interface and computer-readable medium for reformatting data
US7885979B2 (en) * 2005-05-31 2011-02-08 Sorenson Media, Inc. Method, graphical interface and computer-readable medium for forming a batch job
US8296649B2 (en) * 2005-05-31 2012-10-23 Sorenson Media, Inc. Method, graphical interface and computer-readable medium for generating a preview of a reformatted preview segment
US8311091B1 (en) * 2005-06-03 2012-11-13 Visualon, Inc. Cache optimization for video codecs and video filters or color converters
US9104773B2 (en) * 2005-06-21 2015-08-11 Microsoft Technology Licensing, Llc Finding and consuming web subscriptions in a web browser
US8661459B2 (en) * 2005-06-21 2014-02-25 Microsoft Corporation Content syndication platform
CN100447743C (en) * 2005-06-24 2008-12-31 国际商业机器公司 System and method for localizing JAVA GUI application without modifying source code
US20070011171A1 (en) * 2005-07-08 2007-01-11 Nurminen Jukka K System and method for operation control functionality
GB0514192D0 (en) * 2005-07-12 2005-08-17 Ibm Methods, apparatus and computer programs for differential deserialization
US7467155B2 (en) * 2005-07-12 2008-12-16 Sand Technology Systems International, Inc. Method and apparatus for representation of unstructured data
TW200705271A (en) * 2005-07-22 2007-02-01 Mitac Technology Corp Method using a data disk with a built-in operating system to promptly boot computer device
EP1910923A2 (en) * 2005-07-25 2008-04-16 Hercules Software, LLC Direct execution virtual machine
US8161025B2 (en) 2005-07-27 2012-04-17 Schwegman, Lundberg & Woessner, P.A. Patent mapping
US20070038981A1 (en) * 2005-07-29 2007-02-15 Timothy Hanson System and method for multi-threaded resolver with deadlock detection
US7907608B2 (en) 2005-08-12 2011-03-15 Mcafee, Inc. High speed packet capture
US8161548B1 (en) 2005-08-15 2012-04-17 Trend Micro, Inc. Malware detection using pattern classification
US7818326B2 (en) 2005-08-31 2010-10-19 Mcafee, Inc. System and method for word indexing in a capture system and querying thereof
WO2007028226A1 (en) * 2005-09-09 2007-03-15 Ibm Canada Limited - Ibm Canada Limitee Method and system for state machine translation
US7779472B1 (en) * 2005-10-11 2010-08-17 Trend Micro, Inc. Application behavior based malware detection
US8620667B2 (en) * 2005-10-17 2013-12-31 Microsoft Corporation Flexible speech-activated command and control
US7730011B1 (en) 2005-10-19 2010-06-01 Mcafee, Inc. Attributes of captured objects in a capture system
US7818181B2 (en) 2005-10-31 2010-10-19 Focused Medical Analytics Llc Medical practice pattern tool
US7827373B2 (en) * 2005-10-31 2010-11-02 Honeywell International Inc. System and method for managing a short-term heap memory
US10319252B2 (en) 2005-11-09 2019-06-11 Sdl Inc. Language capability assessment and training apparatus and techniques
US9075630B1 (en) * 2005-11-14 2015-07-07 The Mathworks, Inc. Code evaluation of fixed-point math in the presence of customizable fixed-point typing rules
US7665015B2 (en) * 2005-11-14 2010-02-16 Sun Microsystems, Inc. Hardware unit for parsing an XML document
US20090125892A1 (en) * 2005-11-18 2009-05-14 Robert Arthur Crewdson Computer Software Development System and Method
JP2007150785A (en) * 2005-11-29 2007-06-14 Sony Corp Transmission/reception system, transmission apparatus and transmission method, receiving apparatus and receiving method, and program
US8001459B2 (en) 2005-12-05 2011-08-16 Microsoft Corporation Enabling electronic documents for limited-capability computing devices
US20070136746A1 (en) * 2005-12-08 2007-06-14 Electronics And Telecommunications Research Institute User context based dynamic service combination system and method
US7571151B1 (en) * 2005-12-15 2009-08-04 Gneiss Software, Inc. Data analysis tool for analyzing data stored in multiple text files
US20090024598A1 (en) * 2006-12-20 2009-01-22 Ying Xie System, method, and computer program product for information sorting and retrieval using a language-modeling kernel function
US20070150821A1 (en) * 2005-12-22 2007-06-28 Thunemann Paul Z GUI-maker (data-centric automated GUI-generation)
EP1920366A1 (en) 2006-01-20 2008-05-14 Glenbrook Associates, Inc. System and method for context-rich database optimized for processing of concepts
WO2007085304A1 (en) * 2006-01-27 2007-08-02 Swiss Reinsurance Company System for automated generation of database structures and/or databases and a corresponding method
US20070179826A1 (en) * 2006-02-01 2007-08-02 International Business Machines Corporation Creating a modified ontological model of a business machine
US7640247B2 (en) * 2006-02-06 2009-12-29 Microsoft Corporation Distributed namespace aggregation
US8370383B2 (en) 2006-02-08 2013-02-05 Oblong Industries, Inc. Multi-process interactive systems and methods
US8537111B2 (en) 2006-02-08 2013-09-17 Oblong Industries, Inc. Control system for navigating a principal dimension of a data space
US8531396B2 (en) 2006-02-08 2013-09-10 Oblong Industries, Inc. Control system for navigating a principal dimension of a data space
US9910497B2 (en) 2006-02-08 2018-03-06 Oblong Industries, Inc. Gestural control of autonomous and semi-autonomous systems
US8407725B2 (en) * 2007-04-24 2013-03-26 Oblong Industries, Inc. Proteins, pools, and slawx in processing environments
US9823747B2 (en) 2006-02-08 2017-11-21 Oblong Industries, Inc. Spatial, multi-modal control device for use with spatial operating system
US7675854B2 (en) 2006-02-21 2010-03-09 A10 Networks, Inc. System and method for an adaptive TCP SYN cookie with time validation
US7779004B1 (en) 2006-02-22 2010-08-17 Qurio Holdings, Inc. Methods, systems, and products for characterizing target systems
US7764701B1 (en) 2006-02-22 2010-07-27 Qurio Holdings, Inc. Methods, systems, and products for classifying peer systems
US20070208582A1 (en) * 2006-03-02 2007-09-06 International Business Machines Corporation Method, system, and program product for providing an aggregated view
US8280843B2 (en) * 2006-03-03 2012-10-02 Microsoft Corporation RSS data-processing object
US7979803B2 (en) 2006-03-06 2011-07-12 Microsoft Corporation RSS hostable control
US7593927B2 (en) * 2006-03-10 2009-09-22 Microsoft Corporation Unstructured data in a mining model language
US7752596B2 (en) * 2006-03-17 2010-07-06 Microsoft Corporation Connecting alternative development environment to interpretive runtime engine
US8504537B2 (en) 2006-03-24 2013-08-06 Mcafee, Inc. Signature distribution in a document registration system
US20070239505A1 (en) * 2006-03-30 2007-10-11 Microsoft Corporation Abstract execution model for a continuation-based meta-runtime
US7933890B2 (en) * 2006-03-31 2011-04-26 Google Inc. Propagating useful information among related web pages, such as web pages of a website
US7596549B1 (en) 2006-04-03 2009-09-29 Qurio Holdings, Inc. Methods, systems, and products for analyzing annotations for related content
US8838536B2 (en) * 2006-04-18 2014-09-16 Sandeep Bhanote Method and apparatus for mobile data collection and management
US8005841B1 (en) 2006-04-28 2011-08-23 Qurio Holdings, Inc. Methods, systems, and products for classifying content segments
US7958227B2 (en) 2006-05-22 2011-06-07 Mcafee, Inc. Attributes of captured objects in a capture system
US20070288288A1 (en) * 2006-06-07 2007-12-13 Tetsuro Motoyama Use of schedule editors in a network-based project schedule management system
US8050953B2 (en) * 2006-06-07 2011-11-01 Ricoh Company, Ltd. Use of a database in a network-based project schedule management system
US8799043B2 (en) 2006-06-07 2014-08-05 Ricoh Company, Ltd. Consolidation of member schedules with a project schedule in a network-based management system
US8914493B2 (en) * 2008-03-10 2014-12-16 Oracle International Corporation Presence-based event driven architecture
US20070294500A1 (en) * 2006-06-16 2007-12-20 Falco Michael A Methods and system to provide references associated with data streams
US7600088B1 (en) 2006-06-26 2009-10-06 Emc Corporation Techniques for providing storage array services to a cluster of nodes using portal devices
US8396848B2 (en) * 2006-06-26 2013-03-12 Microsoft Corporation Customizable parameter user interface
US8046749B1 (en) * 2006-06-27 2011-10-25 The Mathworks, Inc. Analysis of a sequence of data in object-oriented environments
US8615573B1 (en) 2006-06-30 2013-12-24 Quiro Holdings, Inc. System and method for networked PVR storage and content capture
US8904299B1 (en) 2006-07-17 2014-12-02 The Mathworks, Inc. Graphical user interface for analysis of a sequence of data in object-oriented environment
US7583262B2 (en) * 2006-08-01 2009-09-01 Thomas Yeh Optimization of time-critical software components for real-time interactive applications
US8060514B2 (en) 2006-08-04 2011-11-15 Apple Inc. Methods and systems for managing composite data files
US7747562B2 (en) * 2006-08-15 2010-06-29 International Business Machines Corporation Virtual multidimensional datasets for enterprise software systems
CN101127101A (en) * 2006-08-18 2008-02-20 鸿富锦精密工业(深圳)有限公司 Label information supervision system and method
US8295459B2 (en) * 2006-08-24 2012-10-23 Verisign, Inc. System and method for dynamically partitioning context servers
US7793211B2 (en) * 2006-08-28 2010-09-07 Walter Brenner Method for delivering targeted web advertisements and user annotations to a web page
US7973954B2 (en) * 2006-08-28 2011-07-05 Sharp Laboratories Of America, Inc. Method and apparatus for automatic language switching for an imaging device
US7873988B1 (en) 2006-09-06 2011-01-18 Qurio Holdings, Inc. System and method for rights propagation and license management in conjunction with distribution of digital content in a social network
US9202184B2 (en) 2006-09-07 2015-12-01 International Business Machines Corporation Optimizing the selection, verification, and deployment of expert resources in a time of chaos
US7895150B2 (en) * 2006-09-07 2011-02-22 International Business Machines Corporation Enterprise planning and performance management system providing double dispatch retrieval of multidimensional data
US8255790B2 (en) * 2006-09-08 2012-08-28 Microsoft Corporation XML based form modification with import/export capability
US8271429B2 (en) 2006-09-11 2012-09-18 Wiredset Llc System and method for collecting and processing data
US8244694B2 (en) * 2006-09-12 2012-08-14 International Business Machines Corporation Dynamic schema assembly to accommodate application-specific metadata
US7953713B2 (en) * 2006-09-14 2011-05-31 International Business Machines Corporation System and method for representing and using tagged data in a management system
US20080077384A1 (en) * 2006-09-22 2008-03-27 International Business Machines Corporation Dynamically translating a software application to a user selected target language that is not natively provided by the software application
US10127620B2 (en) 2006-09-26 2018-11-13 Centrifyhealth, Llc Individual health record system and apparatus
US11170879B1 (en) 2006-09-26 2021-11-09 Centrifyhealth, Llc Individual health record system and apparatus
US7801971B1 (en) 2006-09-26 2010-09-21 Qurio Holdings, Inc. Systems and methods for discovering, creating, using, and managing social network circuits
US7693900B2 (en) * 2006-09-27 2010-04-06 The Boeing Company Querying of distributed databases using neutral ontology model for query front end
US7925592B1 (en) 2006-09-27 2011-04-12 Qurio Holdings, Inc. System and method of using a proxy server to manage lazy content distribution in a social network
US7782866B1 (en) 2006-09-29 2010-08-24 Qurio Holdings, Inc. Virtual peer in a peer-to-peer network
US8554827B2 (en) 2006-09-29 2013-10-08 Qurio Holdings, Inc. Virtual peer for a content sharing system
US8055603B2 (en) 2006-10-03 2011-11-08 International Business Machines Corporation Automatic generation of new rules for processing synthetic events using computer-based learning processes
US8145582B2 (en) * 2006-10-03 2012-03-27 International Business Machines Corporation Synthetic events for real time patient analysis
US20080294459A1 (en) * 2006-10-03 2008-11-27 International Business Machines Corporation Health Care Derivatives as a Result of Real Time Patient Analytics
US8555247B2 (en) 2006-10-13 2013-10-08 International Business Machines Corporation Systems and methods for expressing temporal relationships spanning lifecycle representations
US8584199B1 (en) 2006-10-17 2013-11-12 A10 Networks, Inc. System and method to apply a packet routing policy to an application session
US8918755B2 (en) * 2006-10-17 2014-12-23 International Business Machines Corporation Enterprise performance management software system having dynamic code generation
US8312507B2 (en) 2006-10-17 2012-11-13 A10 Networks, Inc. System and method to apply network traffic policy to an application session
US20080098290A1 (en) * 2006-10-23 2008-04-24 Carnet Williams Method and system for providing a widget for displaying multimedia content
US20080098325A1 (en) * 2006-10-23 2008-04-24 Carnet Williams Method and system for facilitating social payment or commercial transactions
US9183002B2 (en) * 2006-10-23 2015-11-10 InMobi Pte Ltd. Method and system for providing a widget for displaying multimedia content
US7565332B2 (en) * 2006-10-23 2009-07-21 Chipin Inc. Method and system for providing a widget usable in affiliate marketing
WO2009099403A2 (en) * 2006-10-23 2009-08-13 Chipin Inc. Method and system for providing a widget for displaying multimedia content
US9311647B2 (en) * 2006-10-23 2016-04-12 InMobi Pte Ltd. Method and system for providing a widget usable in financial transactions
US7962495B2 (en) * 2006-11-20 2011-06-14 Palantir Technologies, Inc. Creating data in a data store using a dynamic ontology
US8515912B2 (en) 2010-07-15 2013-08-20 Palantir Technologies, Inc. Sharing and deconflicting data changes in a multimaster database system
US20080120317A1 (en) * 2006-11-21 2008-05-22 Gile Bradley P Language processing system
US7634454B2 (en) * 2006-11-21 2009-12-15 Microsoft Corporation Concept keywords colorization in program identifiers
US20100198732A1 (en) * 2006-11-27 2010-08-05 Creative Technology Ltd. Communication system, a media player used in the system and a method thereof
US7974993B2 (en) * 2006-12-04 2011-07-05 Microsoft Corporation Application loader for support of version management
US8438535B2 (en) * 2006-12-04 2013-05-07 Sap Ag Method and apparatus for persistent object tool
US20080141230A1 (en) * 2006-12-06 2008-06-12 Microsoft Corporation Scope-Constrained Specification Of Features In A Programming Language
WO2008070860A2 (en) * 2006-12-07 2008-06-12 Linker Sheldon O Method and system for machine understanding, knowledge, and conversation
US7886334B1 (en) 2006-12-11 2011-02-08 Qurio Holdings, Inc. System and method for social network trust assessment
US7730216B1 (en) 2006-12-14 2010-06-01 Qurio Holdings, Inc. System and method of sharing content among multiple social network nodes using an aggregation node
US7650371B2 (en) * 2006-12-14 2010-01-19 Microsoft Corporation Finalizable object usage in software transactions
US7934207B2 (en) * 2006-12-19 2011-04-26 Microsoft Corporation Data schemata in programming language contracts
US8799448B2 (en) * 2006-12-20 2014-08-05 Microsoft Corporation Generating rule packs for monitoring computer systems
US20220414775A1 (en) * 2006-12-21 2022-12-29 Ice Data, Lp Method and system for collecting and using market data from various sources
US8135800B1 (en) 2006-12-27 2012-03-13 Qurio Holdings, Inc. System and method for user classification based on social network aware content analysis
US7680765B2 (en) * 2006-12-27 2010-03-16 Microsoft Corporation Iterate-aggregate query parallelization
US20080168049A1 (en) * 2007-01-08 2008-07-10 Microsoft Corporation Automatic acquisition of a parallel corpus from a network
US7962432B2 (en) * 2007-01-16 2011-06-14 Timmins Software Corporation Analyzing information technology systems using collaborative intelligence data anonimity
US7675527B2 (en) * 2007-01-26 2010-03-09 Microsoft Corp. Multisource composable projection of text
US20080183725A1 (en) * 2007-01-31 2008-07-31 Microsoft Corporation Metadata service employing common data model
US8850414B2 (en) * 2007-02-02 2014-09-30 Microsoft Corporation Direct access of language metadata
US8560654B2 (en) * 2007-02-02 2013-10-15 Hewlett-Packard Development Company Change management
US7917507B2 (en) * 2007-02-12 2011-03-29 Microsoft Corporation Web data usage platform
US8429185B2 (en) 2007-02-12 2013-04-23 Microsoft Corporation Using structured data for online research
US8276060B2 (en) * 2007-02-16 2012-09-25 Palo Alto Research Center Incorporated System and method for annotating documents using a viewer
US8166056B2 (en) * 2007-02-16 2012-04-24 Palo Alto Research Center Incorporated System and method for searching annotated document collections
US8615404B2 (en) * 2007-02-23 2013-12-24 Microsoft Corporation Self-describing data framework
US7783586B2 (en) * 2007-02-26 2010-08-24 International Business Machines Corporation System and method for deriving a hierarchical event based database optimized for analysis of biological systems
US7970759B2 (en) 2007-02-26 2011-06-28 International Business Machines Corporation System and method for deriving a hierarchical event based database optimized for pharmaceutical analysis
US7805390B2 (en) * 2007-02-26 2010-09-28 International Business Machines Corporation System and method for deriving a hierarchical event based database optimized for analysis of complex accidents
US7853611B2 (en) 2007-02-26 2010-12-14 International Business Machines Corporation System and method for deriving a hierarchical event based database having action triggers based on inferred probabilities
US7840903B1 (en) 2007-02-26 2010-11-23 Qurio Holdings, Inc. Group content representations
US7788203B2 (en) * 2007-02-26 2010-08-31 International Business Machines Corporation System and method of accident investigation for complex situations involving numerous known and unknown factors along with their probabilistic weightings
US7788202B2 (en) * 2007-02-26 2010-08-31 International Business Machines Corporation System and method for deriving a hierarchical event based database optimized for clinical applications
US7792774B2 (en) 2007-02-26 2010-09-07 International Business Machines Corporation System and method for deriving a hierarchical event based database optimized for analysis of chaotic events
US7882153B1 (en) * 2007-02-28 2011-02-01 Intuit Inc. Method and system for electronic messaging of trade data
US20080263103A1 (en) 2007-03-02 2008-10-23 Mcgregor Lucas Digital asset management system (DAMS)
US20110106720A1 (en) * 2009-11-05 2011-05-05 Jerome Dale Johnson Expert system for gap analysis
US7958104B2 (en) * 2007-03-08 2011-06-07 O'donnell Shawn C Context based data searching
US20090024590A1 (en) * 2007-03-15 2009-01-22 Sturge Timothy User contributed knowledge database
US8204856B2 (en) * 2007-03-15 2012-06-19 Google Inc. Database replication
US20100121839A1 (en) * 2007-03-15 2010-05-13 Scott Meyer Query optimization
US7870499B2 (en) * 2007-03-16 2011-01-11 Sap Ag System for composing software appliances using user task models
US9729843B1 (en) 2007-03-16 2017-08-08 The Mathworks, Inc. Enriched video for a technical computing environment
US8015175B2 (en) * 2007-03-16 2011-09-06 John Fairweather Language independent stemming
US8005812B1 (en) 2007-03-16 2011-08-23 The Mathworks, Inc. Collaborative modeling environment
US20080235066A1 (en) * 2007-03-19 2008-09-25 Hiroko Mano Task management device, task management method, and task management program
US8095630B1 (en) * 2007-03-20 2012-01-10 Hewlett-Packard Development Company, L.P. Network booting
US8065667B2 (en) * 2007-03-20 2011-11-22 Yahoo! Inc. Injecting content into third party documents for document processing
US9558184B1 (en) * 2007-03-21 2017-01-31 Jean-Michel Vanhalle System and method for knowledge modeling
US8214503B2 (en) * 2007-03-23 2012-07-03 Oracle International Corporation Factoring out dialog control and call control
US20080244511A1 (en) * 2007-03-30 2008-10-02 Microsoft Corporation Developing a writing system analyzer using syntax-directed translation
US20100031342A1 (en) * 2007-04-12 2010-02-04 Honeywell International, Inc Method and system for providing secure video data transmission and processing
US8290967B2 (en) * 2007-04-19 2012-10-16 Barnesandnoble.Com Llc Indexing and search query processing
WO2009009192A2 (en) * 2007-04-18 2009-01-15 Aumni Data, Inc. Adaptive archive data management
US8332209B2 (en) * 2007-04-24 2012-12-11 Zinovy D. Grinblat Method and system for text compression and decompression
US7987446B2 (en) * 2007-04-24 2011-07-26 International Business Machines Corporation Method for automating variables in end-user programming system
EG25474A (en) * 2007-05-21 2012-01-11 Sherikat Link Letatweer Elbarmaguey At Sae Method for translitering and suggesting arabic replacement for a given user input
US7797309B2 (en) * 2007-06-07 2010-09-14 Datamaxx Applied Technologies, Inc. System and method for search parameter data entry and result access in a law enforcement multiple domain security environment
US20080306948A1 (en) * 2007-06-08 2008-12-11 Yahoo! Inc. String and binary data sorting
US8200644B2 (en) * 2007-06-15 2012-06-12 Bryte Computer Technologies, Inc. Methods, systems, and computer program products for search result driven charitable donations
US9015279B2 (en) * 2007-06-15 2015-04-21 Bryte Computer Technologies Methods, systems, and computer program products for tokenized domain name resolution
WO2008156809A1 (en) * 2007-06-19 2008-12-24 Wms Gaming Inc. Plug-in architecture for a wagering game network
US7895189B2 (en) * 2007-06-28 2011-02-22 International Business Machines Corporation Index exploitation
US8086597B2 (en) * 2007-06-28 2011-12-27 International Business Machines Corporation Between matching
US8494911B2 (en) * 2007-06-29 2013-07-23 Verizon Patent And Licensing Inc. Dashboard maintenance/outage correlation
US10007739B1 (en) * 2007-07-03 2018-06-26 Valassis Direct Mail, Inc. Address database reconciliation
US20120229473A1 (en) * 2007-07-17 2012-09-13 Airgini Group, Inc. Dynamic Animation in a Mobile Device
US20090024366A1 (en) * 2007-07-18 2009-01-22 Microsoft Corporation Computerized progressive parsing of mathematical expressions
US20090055433A1 (en) * 2007-07-25 2009-02-26 Gerard Group International Llc System, Apparatus and Method for Organizing Forecasting Event Data
US10795949B2 (en) * 2007-07-26 2020-10-06 Hamid Hatami-Hanza Methods and systems for investigation of compositions of ontological subjects and intelligent systems therefrom
MX2010001408A (en) * 2007-08-07 2010-04-30 Res Foundation Suny Referent tracking of portions of reality.
US7970943B2 (en) * 2007-08-14 2011-06-28 Oracle International Corporation Providing interoperability in software identifier standards
CN101369249B (en) * 2007-08-14 2011-08-17 国际商业机器公司 Method and apparatus for marking GUI component of software
US8442969B2 (en) * 2007-08-14 2013-05-14 John Nicholas Gross Location based news and search engine
WO2009025681A2 (en) * 2007-08-20 2009-02-26 James Heidenreich System to customize the facilitation of development and documentation of user thinking about an arbitrary problem
US20090055806A1 (en) * 2007-08-22 2009-02-26 Jian Tang Techniques for Employing Aspect Advice Based on an Object State
US9111285B2 (en) 2007-08-27 2015-08-18 Qurio Holdings, Inc. System and method for representing content, user presence and interaction within virtual world advertising environments
US8943432B2 (en) * 2007-08-29 2015-01-27 International Business Machines Corporation Dynamically configurable portlet
US8386630B1 (en) 2007-09-09 2013-02-26 Arris Solutions, Inc. Video-aware P2P streaming and download with support for real-time content alteration
US9135340B2 (en) * 2007-09-12 2015-09-15 Datalaw, Inc. Research system and method with record builder
US8522195B2 (en) * 2007-09-14 2013-08-27 Exigen Properties, Inc. Systems and methods to generate a software framework based on semantic modeling and business rules
US8494941B2 (en) * 2007-09-25 2013-07-23 Palantir Technologies, Inc. Feature-based similarity measure for market instruments
US7765204B2 (en) * 2007-09-27 2010-07-27 Microsoft Corporation Method of finding candidate sub-queries from longer queries
US8484115B2 (en) 2007-10-03 2013-07-09 Palantir Technologies, Inc. Object-oriented time series generator
US8171029B2 (en) * 2007-10-05 2012-05-01 Fujitsu Limited Automatic generation of ontologies using word affinities
US8239342B2 (en) * 2007-10-05 2012-08-07 International Business Machines Corporation Method and apparatus for providing on-demand ontology creation and extension
US7930262B2 (en) * 2007-10-18 2011-04-19 International Business Machines Corporation System and method for the longitudinal analysis of education outcomes using cohort life cycles, cluster analytics-based cohort analysis, and probabilistic data schemas
US20090106319A1 (en) * 2007-10-22 2009-04-23 Kabushiki Kaisha Toshiba Data management apparatus and data management method
WO2009090498A2 (en) * 2007-10-30 2009-07-23 Transformer Software, Ltd. Key semantic relations for text processing
US8055497B2 (en) * 2007-11-02 2011-11-08 International Business Machines Corporation Method and system to parse addresses using a processing system
WO2009062109A1 (en) * 2007-11-08 2009-05-14 Linkstorm Apparatuses, methods and systems for hierarchical multidimensional information interfaces
US8539097B2 (en) * 2007-11-14 2013-09-17 Oracle International Corporation Intelligent message processing
US8161171B2 (en) * 2007-11-20 2012-04-17 Oracle International Corporation Session initiation protocol-based internet protocol television
US20090144222A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation Chart generator for searching research data
US20090144242A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation Indexer for searching research data
US20090144241A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation Search term parser for searching research data
US20090144243A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation User interface for searching research data
US20090144318A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation System for searching research data
US20090144265A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation Search engine for searching research data
US20090144317A1 (en) * 2007-12-03 2009-06-04 Chartsource, Inc., A Delaware Corporation Data search markup language for searching research data
US8140584B2 (en) * 2007-12-10 2012-03-20 Aloke Guha Adaptive data classification for data mining
US10002189B2 (en) 2007-12-20 2018-06-19 Apple Inc. Method and apparatus for searching using an active ontology
US7779051B2 (en) 2008-01-02 2010-08-17 International Business Machines Corporation System and method for optimizing federated and ETL'd databases with considerations of specialized data structures within an environment having multidimensional constraints
US9330720B2 (en) 2008-01-03 2016-05-03 Apple Inc. Methods and apparatus for altering audio output signals
US20090178104A1 (en) * 2008-01-08 2009-07-09 Hemal Shah Method and system for a multi-level security association lookup scheme for internet protocol security
US20090177646A1 (en) * 2008-01-09 2009-07-09 Microsoft Corporation Plug-In for Health Monitoring System
US8099267B2 (en) * 2008-01-11 2012-01-17 Schlumberger Technology Corporation Input deck migrator for simulators
US8775441B2 (en) * 2008-01-16 2014-07-08 Ab Initio Technology Llc Managing an archive for approximate string matching
US7877367B2 (en) * 2008-01-22 2011-01-25 International Business Machines Corporation Computer method and apparatus for graphical inquiry specification with progressive summary
US8103660B2 (en) * 2008-01-22 2012-01-24 International Business Machines Corporation Computer method and system for contextual management and awareness of persistent queries and results
US9654515B2 (en) 2008-01-23 2017-05-16 Oracle International Corporation Service oriented architecture-based SCIM platform
US8589338B2 (en) * 2008-01-24 2013-11-19 Oracle International Corporation Service-oriented architecture (SOA) management of data repository
US8005788B2 (en) * 2008-01-28 2011-08-23 International Business Machines Corporation System and method for legacy system component incremental migration
US8225288B2 (en) * 2008-01-29 2012-07-17 Intuit Inc. Model-based testing using branches, decisions, and options
US9817822B2 (en) 2008-02-07 2017-11-14 International Business Machines Corporation Managing white space in a portal web page
US8401022B2 (en) * 2008-02-08 2013-03-19 Oracle International Corporation Pragmatic approaches to IMS
US10540712B2 (en) 2008-02-08 2020-01-21 The Pnc Financial Services Group, Inc. User interface with controller for selectively redistributing funds between accounts
US9076342B2 (en) 2008-02-19 2015-07-07 Architecture Technology Corporation Automated execution and evaluation of network-based training exercises
US7885973B2 (en) * 2008-02-22 2011-02-08 International Business Machines Corporation Computer method and apparatus for parameterized semantic inquiry templates with type annotations
US7949679B2 (en) * 2008-03-05 2011-05-24 International Business Machines Corporation Efficient storage for finite state machines
US8620889B2 (en) * 2008-03-27 2013-12-31 Microsoft Corporation Managing data transfer between endpoints in a distributed computing environment
EP2105847A1 (en) * 2008-03-27 2009-09-30 Alcatel Lucent Device and method for automatically generating ontologies from term definitions contained into a dictionary
US9070095B2 (en) * 2008-04-01 2015-06-30 Siemens Aktiengesellschaft Ensuring referential integrity of medical image data
US8650228B2 (en) * 2008-04-14 2014-02-11 Roderick B. Wideman Methods and systems for space management in data de-duplication
WO2009130606A2 (en) * 2008-04-21 2009-10-29 Vaka Corporation Methods and systems for shareable virtual devices
US9740922B2 (en) 2008-04-24 2017-08-22 Oblong Industries, Inc. Adaptive tracking system for spatial input devices
US9495013B2 (en) 2008-04-24 2016-11-15 Oblong Industries, Inc. Multi-modal gestural interface
US9740293B2 (en) 2009-04-02 2017-08-22 Oblong Industries, Inc. Operating environment with gestural control and multiple client devices, displays, and users
US8723795B2 (en) 2008-04-24 2014-05-13 Oblong Industries, Inc. Detecting, representing, and interpreting three-space input: gestural continuum subsuming freespace, proximal, and surface-contact modes
US9952673B2 (en) 2009-04-02 2018-04-24 Oblong Industries, Inc. Operating environment comprising multiple client devices, multiple displays, multiple users, and gestural control
US9684380B2 (en) 2009-04-02 2017-06-20 Oblong Industries, Inc. Operating environment with gestural control and multiple client devices, displays, and users
US10642364B2 (en) 2009-04-02 2020-05-05 Oblong Industries, Inc. Processing tracking and recognition data in gestural recognition systems
US8521512B2 (en) * 2008-04-30 2013-08-27 Deep Sky Concepts, Inc Systems and methods for natural language communication with a computer
US8401938B1 (en) 2008-05-12 2013-03-19 The Pnc Financial Services Group, Inc. Transferring funds between parties' financial accounts
US8751385B1 (en) 2008-05-15 2014-06-10 The Pnc Financial Services Group, Inc. Financial email
US8001329B2 (en) * 2008-05-19 2011-08-16 International Business Machines Corporation Speculative stream scanning
JP5258400B2 (en) * 2008-06-06 2013-08-07 キヤノン株式会社 Document management system, document management method, and computer program
US8738360B2 (en) * 2008-06-06 2014-05-27 Apple Inc. Data detection of a character sequence having multiple possible data types
US8311806B2 (en) * 2008-06-06 2012-11-13 Apple Inc. Data detection in a sequence of tokens using decision tree reductions
US8443350B2 (en) * 2008-06-06 2013-05-14 Cornell University System and method for scaling simulations and games
US7917547B2 (en) * 2008-06-10 2011-03-29 Microsoft Corporation Virtualizing objects within queries
US8032768B2 (en) * 2008-06-20 2011-10-04 Dell Products, Lp System and method for smoothing power reclamation of blade servers
US8176149B2 (en) * 2008-06-30 2012-05-08 International Business Machines Corporation Ejection of storage drives in a computing network
US7982764B2 (en) * 2008-07-08 2011-07-19 United Parcel Service Of America, Inc. Apparatus for monitoring a package handling system
US8205242B2 (en) 2008-07-10 2012-06-19 Mcafee, Inc. System and method for data mining and security policy management
US8584112B2 (en) * 2008-07-14 2013-11-12 Borland Software Corporation Open application lifecycle management framework
US20100023924A1 (en) * 2008-07-23 2010-01-28 Microsoft Corporation Non-constant data encoding for table-driven systems
US8301437B2 (en) 2008-07-24 2012-10-30 Yahoo! Inc. Tokenization platform
US9032390B2 (en) * 2008-07-29 2015-05-12 Qualcomm Incorporated Framework versioning
US20100031147A1 (en) * 2008-07-31 2010-02-04 Chipln Inc. Method and system for mixing of multimedia content
US20100030549A1 (en) 2008-07-31 2010-02-04 Lee Michael M Mobile device having human language translation capability with positional feedback
US8171045B2 (en) * 2008-07-31 2012-05-01 Xsevo Systems, Inc. Record based code structure
US20100031235A1 (en) * 2008-08-01 2010-02-04 Modular Mining Systems, Inc. Resource Double Lookup Framework
US8167713B2 (en) * 2008-08-05 2012-05-01 Wms Gaming, Inc. Wagering game digital representative
US8762969B2 (en) * 2008-08-07 2014-06-24 Microsoft Corporation Immutable parsing
US7984311B2 (en) 2008-08-08 2011-07-19 Dell Products L.P. Demand based power allocation
US9253154B2 (en) 2008-08-12 2016-02-02 Mcafee, Inc. Configuration management for a capture/registration system
US8959053B2 (en) * 2008-08-13 2015-02-17 Alcatel Lucent Configuration file framework to support high availability schema based upon asynchronous checkpointing
US8505067B2 (en) * 2008-08-21 2013-08-06 Oracle International Corporation Service level network quality of service policy enforcement
US20100070426A1 (en) 2008-09-15 2010-03-18 Palantir Technologies, Inc. Object modeling for exploring large data sets
US9444793B2 (en) 2008-09-15 2016-09-13 Vaultive Ltd. System, apparatus and method for encryption and decryption of data transmitted over a network
US8429194B2 (en) 2008-09-15 2013-04-23 Palantir Technologies, Inc. Document-based workflows
GB2463669A (en) * 2008-09-19 2010-03-24 Motorola Inc Using a semantic graph to expand characterising terms of a content item and achieve targeted selection of associated content items
US8768892B2 (en) * 2008-09-29 2014-07-01 Microsoft Corporation Analyzing data and providing recommendations
US8166077B2 (en) * 2008-09-30 2012-04-24 International Business Machines Corporation Mapping a class, method, package, and/or pattern to a component
US8676904B2 (en) 2008-10-02 2014-03-18 Apple Inc. Electronic devices with voice command and contextual data processing capabilities
US8266148B2 (en) * 2008-10-07 2012-09-11 Aumni Data, Inc. Method and system for business intelligence analytics on unstructured data
US20100131513A1 (en) 2008-10-23 2010-05-27 Lundberg Steven W Patent mapping
KR101607178B1 (en) 2008-10-23 2016-03-29 아브 이니티오 테크놀로지 엘엘시 A method, a system, and a computer-readable medium storing a computer program for performing a data operation, measuring data quality, or joining data elements
US8548797B2 (en) * 2008-10-30 2013-10-01 Yahoo! Inc. Short text language detection using geographic information
KR101574603B1 (en) 2008-10-31 2015-12-04 삼성전자주식회사 A method for conditional processing and an apparatus thereof
US8315994B2 (en) 2008-10-31 2012-11-20 Disney Enterprises, Inc. System and method for updating digital media content
US9235572B2 (en) * 2008-10-31 2016-01-12 Disney Enterprises, Inc. System and method for updating digital media content
US20100115438A1 (en) * 2008-11-05 2010-05-06 Yu-Chung Chu Method for creating multi-level widgets and system thereof
US9542700B2 (en) * 2008-11-05 2017-01-10 Yu-Hua Chu Business model based on multi-level application widgets and system thereof
TW201020992A (en) * 2008-11-19 2010-06-01 Univ Chung Yuan Christian User interface for interactive teaching, and method for operating the same
US20100138854A1 (en) * 2008-12-02 2010-06-03 Electronics And Telecommunications Research Institute Method and system for controlling restriction on viewing multimedia contents
KR101301243B1 (en) 2008-12-02 2013-08-28 한국전자통신연구원 Method for controlling restriction to viewing multimedia contents and system thereof
US8762963B2 (en) * 2008-12-04 2014-06-24 Beck Fund B.V. L.L.C. Translation of programming code
US8397222B2 (en) * 2008-12-05 2013-03-12 Peter D. Warren Any-to-any system for doing computing
US8805861B2 (en) * 2008-12-09 2014-08-12 Google Inc. Methods and systems to train models to extract and integrate information from data sources
CN101459619B (en) * 2009-01-05 2011-01-05 杭州华三通信技术有限公司 Method and apparatus for packet transmission processing in network
US8850591B2 (en) 2009-01-13 2014-09-30 Mcafee, Inc. System and method for concept building
US8706709B2 (en) 2009-01-15 2014-04-22 Mcafee, Inc. System and method for intelligent term grouping
US20110093500A1 (en) * 2009-01-21 2011-04-21 Google Inc. Query Optimization
US20100192053A1 (en) * 2009-01-26 2010-07-29 Kabushiki Kaisha Toshiba Workflow system and method of designing entry form used for workflow
US8965798B1 (en) 2009-01-30 2015-02-24 The Pnc Financial Services Group, Inc. Requesting reimbursement for transactions
US10891037B1 (en) 2009-01-30 2021-01-12 The Pnc Financial Services Group, Inc. User interfaces and system including same
US8458105B2 (en) * 2009-02-12 2013-06-04 Decisive Analytics Corporation Method and apparatus for analyzing and interrelating data
US20100235314A1 (en) * 2009-02-12 2010-09-16 Decisive Analytics Corporation Method and apparatus for analyzing and interrelating video data
US8180824B2 (en) 2009-02-23 2012-05-15 Trane International, Inc. Log collection data harvester for use in a building automation system
US8239842B2 (en) * 2009-02-24 2012-08-07 Microsoft Corporation Implicit line continuation
US8473442B1 (en) 2009-02-25 2013-06-25 Mcafee, Inc. System and method for intelligent state management
CA2754953A1 (en) * 2009-03-10 2010-09-16 Karen Swenson Systems and methods for address intelligence
US20100241893A1 (en) 2009-03-18 2010-09-23 Eric Friedman Interpretation and execution of a customizable database request using an extensible computer process and an available computing environment
US20100241755A1 (en) * 2009-03-18 2010-09-23 Microsoft Corporation Permission model for feed content
US9342508B2 (en) * 2009-03-19 2016-05-17 Microsoft Technology Licensing, Llc Data localization templates and parsing
US20100241579A1 (en) * 2009-03-19 2010-09-23 Microsoft Corporation Feed Content Presentation
US8077050B2 (en) * 2009-03-24 2011-12-13 United Parcel Service Of America, Inc. Transport system evaluator
US8667121B2 (en) 2009-03-25 2014-03-04 Mcafee, Inc. System and method for managing data and policies
US8447722B1 (en) 2009-03-25 2013-05-21 Mcafee, Inc. System and method for data mining and security policy management
US8799877B2 (en) * 2009-03-27 2014-08-05 Optumsoft, Inc. Interpreter-based program language translator using embedded interpreter types and variables
US20100250613A1 (en) * 2009-03-30 2010-09-30 Microsoft Corporation Query processing using arrays
CA2660748C (en) * 2009-03-31 2016-08-09 Trapeze Software Inc. System for aggregating data and a method for providing the same
US9317128B2 (en) 2009-04-02 2016-04-19 Oblong Industries, Inc. Remote devices used in a markerless installation of a spatial operating environment incorporating gestural control
US10824238B2 (en) 2009-04-02 2020-11-03 Oblong Industries, Inc. Operating environment with gestural control and multiple client devices, displays, and users
US8364644B1 (en) * 2009-04-22 2013-01-29 Network Appliance, Inc. Exclusion of data from a persistent point-in-time image
US8972445B2 (en) 2009-04-23 2015-03-03 Deep Sky Concepts, Inc. Systems and methods for storage of declarative knowledge accessible by natural language in a computer capable of appropriately responding
US8275788B2 (en) 2009-11-17 2012-09-25 Glace Holding Llc System and methods for accessing web pages using natural language
US9805020B2 (en) 2009-04-23 2017-10-31 Deep Sky Concepts, Inc. In-context access of stored declarative knowledge using natural language expression
US20100281025A1 (en) * 2009-05-04 2010-11-04 Motorola, Inc. Method and system for recommendation of content items
US8204900B2 (en) * 2009-05-21 2012-06-19 Bank Of America Corporation Metrics library
US8311961B2 (en) * 2009-05-29 2012-11-13 International Business Machines Corporation Effort estimation using text analysis
US8879547B2 (en) * 2009-06-02 2014-11-04 Oracle International Corporation Telephony application services
US8429395B2 (en) 2009-06-12 2013-04-23 Microsoft Corporation Controlling access to software component state
US9594759B2 (en) * 2009-06-16 2017-03-14 Microsoft Technology Licensing, Llc Backup and archival of selected items as a composite object
US20100325214A1 (en) * 2009-06-18 2010-12-23 Microsoft Corporation Predictive Collaboration
US8909566B2 (en) * 2009-06-23 2014-12-09 Oracle International Corporation Method, a computer program and apparatus for analyzing symbols in a computer
US9933914B2 (en) * 2009-07-06 2018-04-03 Nokia Technologies Oy Method and apparatus of associating application state information with content and actions
JP4892626B2 (en) * 2009-07-08 2012-03-07 東芝テック株式会社 Printer and message data management program
JP5471106B2 (en) * 2009-07-16 2014-04-16 独立行政法人情報通信研究機構 Speech translation system, dictionary server device, and program
US20110029904A1 (en) * 2009-07-30 2011-02-03 Adam Miles Smith Behavior and Appearance of Touch-Optimized User Interface Elements for Controlling Computer Function
JP5375413B2 (en) 2009-07-30 2013-12-25 富士通株式会社 Data conversion apparatus, data conversion method, and data conversion program
US8386498B2 (en) * 2009-08-05 2013-02-26 Loglogic, Inc. Message descriptions
US9123006B2 (en) * 2009-08-11 2015-09-01 Novell, Inc. Techniques for parallel business intelligence evaluation and management
US9542408B2 (en) 2010-08-27 2017-01-10 Pneuron Corp. Method and process for enabling distributing cache data sources for query processing and distributed disk caching of large data and analysis requests
JP2013503398A (en) * 2009-08-28 2013-01-31 ニューロン コーポレーション Systems and methods employing the use of neural networks for real-time business intelligence and automation control
US8505813B2 (en) 2009-09-04 2013-08-13 Bank Of America Corporation Customer benefit offer program enrollment
JP4992945B2 (en) * 2009-09-10 2012-08-08 株式会社日立製作所 Stream data generation method, stream data generation device, and stream data generation program
FR2950170B1 (en) * 2009-09-16 2011-10-14 Airbus Operations Sas METHOD FOR GENERATING INTERFACE CONFIGURATION FILES FOR CALCULATORS OF AN AVIONIC PLATFORM
US8364463B2 (en) 2009-09-25 2013-01-29 International Business Machines Corporation Optimizing a language/media translation map
US9031243B2 (en) * 2009-09-28 2015-05-12 iZotope, Inc. Automatic labeling and control of audio algorithms by audio recognition
US8645936B2 (en) * 2009-09-30 2014-02-04 Zynga Inc. Apparatuses, methods and systems for an a API call abstractor
US8266125B2 (en) * 2009-10-01 2012-09-11 Starcounter Ab Systems and methods for managing databases
US9971807B2 (en) 2009-10-14 2018-05-15 Oblong Industries, Inc. Multi-process interactive systems and methods
US9933852B2 (en) 2009-10-14 2018-04-03 Oblong Industries, Inc. Multi-process interactive systems and methods
US9960967B2 (en) 2009-10-21 2018-05-01 A10 Networks, Inc. Determining an application delivery server based on geo-location information
US8341154B2 (en) * 2009-10-28 2012-12-25 Microsoft Corporation Extending types hosted in database to other platforms
US20110107246A1 (en) * 2009-11-03 2011-05-05 Schlumberger Technology Corporation Undo/redo operations for multi-object data
US20110106776A1 (en) * 2009-11-03 2011-05-05 Schlumberger Technology Corporation Incremental implementation of undo/redo support in legacy applications
TWI480746B (en) * 2009-11-09 2015-04-11 Hewlett Packard Development Co Enabling faster full-text searching using a structured data store
KR101767262B1 (en) 2009-11-09 2017-08-11 삼성전자주식회사 Method and apparatus for changing input format in input system using universal plug and play
US8583830B2 (en) * 2009-11-19 2013-11-12 Oracle International Corporation Inter-working with a walled garden floor-controlled system
US20110125913A1 (en) * 2009-11-20 2011-05-26 Oracle International Corporation Interface for Communication Session Continuation
US9137206B2 (en) * 2009-11-20 2015-09-15 International Business Machines Corporation Service registry for saving and restoring a faceted selection
US8533773B2 (en) * 2009-11-20 2013-09-10 Oracle International Corporation Methods and systems for implementing service level consolidated user information management
US20110125909A1 (en) * 2009-11-20 2011-05-26 Oracle International Corporation In-Session Continuation of a Streaming Media Session
US9269060B2 (en) * 2009-11-20 2016-02-23 Oracle International Corporation Methods and systems for generating metadata describing dependencies for composable elements
US9503407B2 (en) 2009-12-16 2016-11-22 Oracle International Corporation Message forwarding
US9509790B2 (en) * 2009-12-16 2016-11-29 Oracle International Corporation Global presence
KR20110072847A (en) * 2009-12-23 2011-06-29 삼성전자주식회사 Dialog management system or method for processing information seeking dialog
US8458172B2 (en) * 2009-12-24 2013-06-04 At&T Intellectual Property I, L.P. Method and apparatus for automated end to end content tracking in peer to peer environments
US8495028B2 (en) * 2010-01-25 2013-07-23 Sepaton, Inc. System and method for data driven de-duplication
US8140533B1 (en) * 2010-01-26 2012-03-20 Google Inc. Harvesting relational tables from lists on the web
US8682667B2 (en) 2010-02-25 2014-03-25 Apple Inc. User profiling for selecting user specific voice input processing information
US20110219016A1 (en) * 2010-03-04 2011-09-08 Src, Inc. Stream Mining via State Machine and High Dimensionality Database
US10417646B2 (en) 2010-03-09 2019-09-17 Sdl Inc. Predicting the cost associated with translating textual content
US8874526B2 (en) * 2010-03-31 2014-10-28 Cloudera, Inc. Dynamically processing an event using an extensible data model
US8791949B1 (en) 2010-04-06 2014-07-29 The Pnc Financial Services Group, Inc. Investment management marketing tool
US8780115B1 (en) 2010-04-06 2014-07-15 The Pnc Financial Services Group, Inc. Investment management marketing tool
US8954413B2 (en) * 2010-04-12 2015-02-10 Thermopylae Sciences and Technology Methods and apparatus for adaptively harvesting pertinent data
CN102236681A (en) * 2010-04-20 2011-11-09 中兴通讯股份有限公司 System and method for storing and obtaining data
US8412510B2 (en) * 2010-04-21 2013-04-02 Fisher-Rosemount Systems, Inc. Methods and apparatus to display localized resources in process control applications
US8490056B2 (en) * 2010-04-28 2013-07-16 International Business Machines Corporation Automatic identification of subroutines from test scripts
US9880860B2 (en) * 2010-05-05 2018-01-30 Microsoft Technology Licensing, Llc Automatic return to synchronization context for asynchronous computations
WO2011145044A1 (en) * 2010-05-17 2011-11-24 Green Sql Ltd Database translation system and method
CA2800163A1 (en) 2010-05-21 2011-11-24 Vaultive Ltd. System and method for controlling and monitoring access to data processing applications
US8850354B1 (en) * 2010-05-21 2014-09-30 Google Inc. Multi-window web-based application structure
US8266102B2 (en) * 2010-05-26 2012-09-11 International Business Machines Corporation Synchronization of sequential access storage components with backup catalog
GB2494337A (en) * 2010-05-28 2013-03-06 Securitymetrics Inc Systems and methods for determining whether data includes strings that correspond to sensitive information
US20110307292A1 (en) * 2010-06-09 2011-12-15 Decernis, Llc System and Method for Analysis and Visualization of Emerging Issues in Manufacturing and Supply Chain Management
US8423444B1 (en) 2010-07-02 2013-04-16 The Pnc Financial Services Group, Inc. Investor personality tool
US11475523B1 (en) 2010-07-02 2022-10-18 The Pnc Financial Services Group, Inc. Investor retirement lifestyle planning tool
US11475524B1 (en) 2010-07-02 2022-10-18 The Pnc Financial Services Group, Inc. Investor retirement lifestyle planning tool
US8417614B1 (en) 2010-07-02 2013-04-09 The Pnc Financial Services Group, Inc. Investor personality tool
US9043296B2 (en) 2010-07-30 2015-05-26 Microsoft Technology Licensing, Llc System of providing suggestions based on accessible and contextual information
US8468391B2 (en) * 2010-08-04 2013-06-18 International Business Machines Corporation Utilizing log event ontology to deliver user role specific solutions for problem determination
JP5124001B2 (en) * 2010-09-08 2013-01-23 シャープ株式会社 Translation apparatus, translation method, computer program, and recording medium
US8370489B2 (en) 2010-09-22 2013-02-05 The Nielsen Company (Us), Llc Methods and apparatus to determine impressions using distributed demographic information
US10089390B2 (en) 2010-09-24 2018-10-02 International Business Machines Corporation System and method to extract models from semi-structured documents
US9177017B2 (en) * 2010-09-27 2015-11-03 Microsoft Technology Licensing, Llc Query constraint encoding with type-based state machine
US9684712B1 (en) * 2010-09-28 2017-06-20 EMC IP Holding Company LLC Analyzing tenant-specific data
US9215275B2 (en) 2010-09-30 2015-12-15 A10 Networks, Inc. System and method to balance servers based on server load status
FR2965952B1 (en) * 2010-10-06 2013-06-21 Commissariat Energie Atomique METHOD FOR UPDATING A REVERSE INDEX AND SERVER IMPLEMENTING SAID METHOD
US10318877B2 (en) 2010-10-19 2019-06-11 International Business Machines Corporation Cohort-based prediction of a future event
US8818963B2 (en) 2010-10-29 2014-08-26 Microsoft Corporation Halloween protection in a multi-version database system
US8965751B2 (en) * 2010-11-01 2015-02-24 Microsoft Corporation Providing multi-lingual translation for third party content feed applications
US8806615B2 (en) 2010-11-04 2014-08-12 Mcafee, Inc. System and method for protecting specified data combinations
TWI415427B (en) 2010-11-04 2013-11-11 Ind Tech Res Inst System and method for peer-to-peer live streaming
US9710429B1 (en) * 2010-11-12 2017-07-18 Google Inc. Providing text resources updated with translation input from multiple users
US9609052B2 (en) 2010-12-02 2017-03-28 A10 Networks, Inc. Distributing application traffic to servers based on dynamic service response time
CN102486798A (en) * 2010-12-03 2012-06-06 腾讯科技(深圳)有限公司 Data loading method and device
US9008884B2 (en) 2010-12-15 2015-04-14 Symbotic Llc Bot position sensing
US9304672B2 (en) 2010-12-17 2016-04-05 Microsoft Technology Licensing, Llc Representation of an interactive document as a graph of entities
US9110957B2 (en) 2010-12-17 2015-08-18 Microsoft Technology Licensing, Llc Data mining in a business intelligence document
US9069557B2 (en) 2010-12-17 2015-06-30 Microsoft Technology Licensing, LLP Business intelligence document
US9171272B2 (en) 2010-12-17 2015-10-27 Microsoft Technology Licensing, LLP Automated generation of analytic and visual behavior
US9024952B2 (en) 2010-12-17 2015-05-05 Microsoft Technology Licensing, Inc. Discovering and configuring representations of data via an insight taxonomy
US9111238B2 (en) * 2010-12-17 2015-08-18 Microsoft Technology Licensing, Llc Data feed having customizable analytic and visual behavior
US9864966B2 (en) 2010-12-17 2018-01-09 Microsoft Technology Licensing, Llc Data mining in a business intelligence document
US9336184B2 (en) 2010-12-17 2016-05-10 Microsoft Technology Licensing, Llc Representation of an interactive document as a graph of entities
US9104992B2 (en) 2010-12-17 2015-08-11 Microsoft Technology Licensing, Llc Business application publication
US9122639B2 (en) 2011-01-25 2015-09-01 Sepaton, Inc. Detection and deduplication of backup sets exhibiting poor locality
JP5910510B2 (en) * 2011-01-27 2016-04-27 日本電気株式会社 UI (UserInterface) creation support apparatus, UI creation support method, and program
US9275093B2 (en) * 2011-01-28 2016-03-01 Cisco Technology, Inc. Indexing sensor data
US9225793B2 (en) * 2011-01-28 2015-12-29 Cisco Technology, Inc. Aggregating sensor data
US9171079B2 (en) * 2011-01-28 2015-10-27 Cisco Technology, Inc. Searching sensor data
US10657540B2 (en) 2011-01-29 2020-05-19 Sdl Netherlands B.V. Systems, methods, and media for web content management
US9547626B2 (en) 2011-01-29 2017-01-17 Sdl Plc Systems, methods, and media for managing ambient adaptability of web applications and web services
US9058560B2 (en) 2011-02-17 2015-06-16 Superior Edge, Inc. Methods, apparatus and systems for generating, updating and executing an invasive species control plan
US10580015B2 (en) 2011-02-25 2020-03-03 Sdl Netherlands B.V. Systems, methods, and media for executing and optimizing online marketing initiatives
US10140320B2 (en) 2011-02-28 2018-11-27 Sdl Inc. Systems, methods, and media for generating analytical data
US9852470B1 (en) 2011-02-28 2017-12-26 The Pnc Financial Services Group, Inc. Time period analysis tools for wealth management transactions
US8321316B1 (en) 2011-02-28 2012-11-27 The Pnc Financial Services Group, Inc. Income analysis tools for wealth management
US8374940B1 (en) 2011-02-28 2013-02-12 The Pnc Financial Services Group, Inc. Wealth allocation analysis tools
US9665908B1 (en) 2011-02-28 2017-05-30 The Pnc Financial Services Group, Inc. Net worth analysis tools
WO2012122516A1 (en) * 2011-03-10 2012-09-13 Redoak Logic, Inc. System and method for converting large data sets to other information to observations for analysis to reveal complex relationship
EP2686779A4 (en) 2011-03-18 2014-09-17 Nielsen Co Us Llc Methods and apparatus to determine media impressions
US9104663B1 (en) * 2011-03-18 2015-08-11 Emc Corporation Dynamic allocation of memory for memory intensive operators
US9262612B2 (en) 2011-03-21 2016-02-16 Apple Inc. Device access using voice authentication
EP2695050A4 (en) 2011-04-07 2016-03-23 Pneuron Corp Legacy application migration to real time, parallel performance cloud
US10749887B2 (en) 2011-04-08 2020-08-18 Proofpoint, Inc. Assessing security risks of users in a computing network
US9373267B2 (en) * 2011-04-08 2016-06-21 Wombat Security Technologies, Inc. Method and system for controlling context-aware cybersecurity training
US9558677B2 (en) 2011-04-08 2017-01-31 Wombat Security Technologies, Inc. Mock attack cybersecurity training system and methods
US9824609B2 (en) 2011-04-08 2017-11-21 Wombat Security Technologies, Inc. Mock attack cybersecurity training system and methods
US9547998B2 (en) * 2011-04-08 2017-01-17 Wombat Security Technologies, Inc. Context-aware training systems, apparatuses, and methods
US10733570B1 (en) 2011-04-19 2020-08-04 The Pnc Financial Services Group, Inc. Facilitating employee career development
US9904726B2 (en) 2011-05-04 2018-02-27 Black Hills IP Holdings, LLC. Apparatus and method for automated and assisted patent claim mapping and expense planning
US8751298B1 (en) 2011-05-09 2014-06-10 Bank Of America Corporation Event-driven coupon processor alert
US9892419B1 (en) 2011-05-09 2018-02-13 Bank Of America Corporation Coupon deposit account fraud protection system
JP5615991B2 (en) * 2011-05-11 2014-10-29 グーグル・インコーポレーテッド Parallel generation of topics from documents
US20120291011A1 (en) * 2011-05-12 2012-11-15 Google Inc. User Interfaces to Assist in Creating Application Scripts
US20120296910A1 (en) * 2011-05-16 2012-11-22 Michal Skubacz Method and system for retrieving information
US8856452B2 (en) 2011-05-31 2014-10-07 Illinois Institute Of Technology Timing-aware data prefetching for microprocessors
US10331658B2 (en) * 2011-06-03 2019-06-25 Gdial Inc. Systems and methods for atomizing and individuating data as data quanta
US10057736B2 (en) 2011-06-03 2018-08-21 Apple Inc. Active transport based notifications
US9146133B2 (en) * 2011-06-06 2015-09-29 Honeywell International Inc. Methods and systems for displaying procedure information on an aircraft display
US8924974B1 (en) * 2011-06-08 2014-12-30 Workday, Inc. System for error checking of process definitions for batch processes
US9626458B2 (en) * 2011-06-14 2017-04-18 Nec Corporation Evaluation model generation device, evaluation model generation method, and evaluation model generation program
US8538949B2 (en) * 2011-06-17 2013-09-17 Microsoft Corporation Interactive web crawler
US9092482B2 (en) 2013-03-14 2015-07-28 Palantir Technologies, Inc. Fair scheduling for mixed-query loads
US9378138B2 (en) * 2011-06-29 2016-06-28 International Business Machines Corporation Conservative garbage collection and access protection
EP2727314A1 (en) * 2011-06-30 2014-05-07 Telefonaktiebolaget L M Ericsson (publ) Flexible data communication
US9946991B2 (en) 2011-06-30 2018-04-17 3M Innovative Properties Company Methods using multi-dimensional representations of medical codes
US8935676B2 (en) * 2011-08-07 2015-01-13 Hewlett-Packard Development Company, L.P. Automated test failure troubleshooter
CA2759516C (en) 2011-11-24 2019-12-31 Ibm Canada Limited - Ibm Canada Limitee Serialization of pre-initialized objects
US8510320B2 (en) * 2011-08-10 2013-08-13 Sap Ag Silent migration of business process binaries
US20130042235A1 (en) * 2011-08-10 2013-02-14 International Business Machines Corporation Dynamic bootstrap literal processing within a managed runtime environment
US8688499B1 (en) * 2011-08-11 2014-04-01 Google Inc. System and method for generating business process models from mapped time sequenced operational and transaction data
US9984054B2 (en) 2011-08-24 2018-05-29 Sdl Inc. Web interface including the review and manipulation of a web document and utilizing permission based control
US20130055078A1 (en) * 2011-08-24 2013-02-28 Salesforce.Com, Inc. Systems and methods for improved navigation of a multi-page display
US8732574B2 (en) 2011-08-25 2014-05-20 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US9053394B2 (en) * 2011-08-30 2015-06-09 5D Robotics, Inc. Vehicle management system
TWI622540B (en) 2011-09-09 2018-05-01 辛波提克有限責任公司 Automated storage and retrieval system
US8595322B2 (en) * 2011-09-12 2013-11-26 Microsoft Corporation Target subscription for a notification distribution system
US8694462B2 (en) 2011-09-12 2014-04-08 Microsoft Corporation Scale-out system to acquire event data
JP5733124B2 (en) * 2011-09-12 2015-06-10 富士通株式会社 Data management apparatus, data management system, data management method, and program
US9208476B2 (en) 2011-09-12 2015-12-08 Microsoft Technology Licensing, Llc Counting and resetting broadcast system badge counters
US8898628B2 (en) 2011-09-23 2014-11-25 Ahmad RAZA Method and an apparatus for developing software
US10630559B2 (en) 2011-09-27 2020-04-21 UST Global (Singapore) Pte. Ltd. Virtual machine (VM) realm integration and management
JP5594269B2 (en) * 2011-09-29 2014-09-24 コニカミノルタ株式会社 File name creation device, image forming device, and file name creation program
US20130086070A1 (en) 2011-10-03 2013-04-04 Steven W. Lundberg Prior art management
US20130086106A1 (en) 2011-10-03 2013-04-04 Black Hills Ip Holdings, Llc Systems, methods and user interfaces in a patent management system
US8897154B2 (en) 2011-10-24 2014-11-25 A10 Networks, Inc. Combining stateless and stateful server load balancing
US8181254B1 (en) * 2011-10-28 2012-05-15 Google Inc. Setting default security features for use with web applications and extensions
CA2756102A1 (en) * 2011-11-01 2012-01-03 Cit Global Mobile Division Method and system for localizing an application on a computing device
AU2012340429B2 (en) 2011-11-15 2016-12-01 Ab Initio Technology Llc Data clustering based on candidate queries
US9529829B1 (en) * 2011-11-18 2016-12-27 Veritas Technologies Llc System and method to facilitate the use of processed data from a storage system to perform tasks
US8762390B2 (en) * 2011-11-21 2014-06-24 Nec Laboratories America, Inc. Query specific fusion for image retrieval
US9203805B2 (en) 2011-11-23 2015-12-01 Cavium, Inc. Reverse NFA generation and processing
US9386088B2 (en) 2011-11-29 2016-07-05 A10 Networks, Inc. Accelerating service processing using fast path TCP
US10423515B2 (en) * 2011-11-29 2019-09-24 Microsoft Technology Licensing, Llc Recording touch information
KR101277145B1 (en) 2011-12-07 2013-06-20 한국과학기술연구원 Method For Transforming Intermediate Language by Using Common Representation, System And Computer-Readable Recording Medium with Program Therefor
KR101349628B1 (en) 2011-12-07 2014-01-09 한국과학기술연구원 Method For Transforming Intermediate Language by Using Operator, System And Computer-Readable Recording Medium with Program Therefor
US9171158B2 (en) 2011-12-12 2015-10-27 International Business Machines Corporation Dynamic anomaly, association and clustering detection
WO2013090555A1 (en) 2011-12-13 2013-06-20 Pneuron Corp. Pneuron distributed analytics
US9235396B2 (en) * 2011-12-13 2016-01-12 Microsoft Technology Licensing, Llc Optimizing data partitioning for data-parallel computing
US9094364B2 (en) 2011-12-23 2015-07-28 A10 Networks, Inc. Methods to manage services over a service gateway
US20130246336A1 (en) 2011-12-27 2013-09-19 Mcafee, Inc. System and method for providing data protection workflows in a network environment
TWI480730B (en) 2011-12-30 2015-04-11 Ibm Method and apparatus for measuring performance of an appliance
WO2013105222A1 (en) * 2012-01-11 2013-07-18 株式会社日立製作所 Work support device, work support method and work support program
US10169812B1 (en) 2012-01-20 2019-01-01 The Pnc Financial Services Group, Inc. Providing financial account information to users
US10044582B2 (en) 2012-01-28 2018-08-07 A10 Networks, Inc. Generating secure name records
US8762315B2 (en) * 2012-02-07 2014-06-24 Alan A. Yelsey Interactive portal for facilitating the representation and exploration of complexity
US9015255B2 (en) 2012-02-14 2015-04-21 The Nielsen Company (Us), Llc Methods and apparatus to identify session users with cookie information
CN104145249B (en) * 2012-02-29 2017-08-15 飞思卡尔半导体公司 Method and system for debugging computer program
US10134385B2 (en) 2012-03-02 2018-11-20 Apple Inc. Systems and methods for name pronunciation
US9760380B2 (en) * 2012-03-14 2017-09-12 Microsoft Technology Licensing, Llc Using grammar to serialize and de-serialize objects
US20130254139A1 (en) * 2012-03-21 2013-09-26 Xiaoguang Lei Systems and methods for building a universal intelligent assistant with learning capabilities
US8813046B2 (en) * 2012-03-23 2014-08-19 Infosys Limited System and method for internationalization encoding
US8849757B2 (en) 2012-03-29 2014-09-30 Empire Technology Development Llc Determining user key-value storage needs from example queries
WO2013149371A1 (en) 2012-04-01 2013-10-10 Empire Technology Development Llc Machine learning for database migration source
US9418083B2 (en) 2012-04-20 2016-08-16 Patterson Thuente Pedersen, P.A. System for computerized evaluation of patent-related information
US8914809B1 (en) 2012-04-24 2014-12-16 Open Text S.A. Message broker system and method
US20130290326A1 (en) * 2012-04-25 2013-10-31 Yevgeniy Lebedev System for dynamically linking tags with a virtual repository of a registered user
US8914387B2 (en) * 2012-04-26 2014-12-16 Sap Ag Calculation models using annotations for filter optimization
US8856168B2 (en) * 2012-04-30 2014-10-07 Hewlett-Packard Development Company, L.P. Contextual application recommendations
US9773270B2 (en) 2012-05-11 2017-09-26 Fredhopper B.V. Method and system for recommending products based on a ranking cocktail
US9141290B2 (en) * 2012-05-13 2015-09-22 Emc Corporation Snapshot mechanism
US10261994B2 (en) 2012-05-25 2019-04-16 Sdl Inc. Method and system for automatic management of reputation of translators
US8694508B2 (en) * 2012-06-04 2014-04-08 Sap Ag Columnwise storage of point data
US8830714B2 (en) 2012-06-07 2014-09-09 International Business Machines Corporation High speed large scale dictionary matching
US9721563B2 (en) 2012-06-08 2017-08-01 Apple Inc. Name recognition system
AU2013204865B2 (en) 2012-06-11 2015-07-09 The Nielsen Company (Us), Llc Methods and apparatus to share online media impressions data
US9489649B2 (en) * 2012-06-18 2016-11-08 Sap Se Message payload editor
US9672209B2 (en) * 2012-06-21 2017-06-06 International Business Machines Corporation Dynamic translation substitution
US9465835B2 (en) 2012-06-25 2016-10-11 Sap Se Columnwise spatial aggregation
US8782221B2 (en) * 2012-07-05 2014-07-15 A10 Networks, Inc. Method to allocate buffer for TCP proxy session based on dynamic network conditions
WO2014014906A2 (en) * 2012-07-16 2014-01-23 Pneuron Corp. A method and process for enabling distributing cache data sources for query processing and distributed disk caching of large data and analysis requests
US9727350B2 (en) * 2012-07-26 2017-08-08 Entit Software Llc Localizing computer program code
FR2994296B1 (en) * 2012-08-01 2015-06-19 Netwave DATA PROCESSING METHOD FOR SITUATIONAL ANALYSIS
US9141623B2 (en) 2012-08-03 2015-09-22 International Business Machines Corporation System for on-line archiving of content in an object store
US9113590B2 (en) 2012-08-06 2015-08-25 Superior Edge, Inc. Methods, apparatus, and systems for determining in-season crop status in an agricultural crop and alerting users
US11461862B2 (en) 2012-08-20 2022-10-04 Black Hills Ip Holdings, Llc Analytics generation for patent portfolio management
US9461876B2 (en) * 2012-08-29 2016-10-04 Loci System and method for fuzzy concept mapping, voting ontology crowd sourcing, and technology prediction
AU2013204953B2 (en) 2012-08-30 2016-09-08 The Nielsen Company (Us), Llc Methods and apparatus to collect distributed user information for media impressions
US9615788B2 (en) 2012-08-31 2017-04-11 Nuvectra Corporation Method and system of producing 2D representations of 3D pain and stimulation maps and implant models on a clinician programmer
US9375582B2 (en) 2012-08-31 2016-06-28 Nuvectra Corporation Touch screen safety controls for clinician programmer
US9471753B2 (en) 2012-08-31 2016-10-18 Nuvectra Corporation Programming and virtual reality representation of stimulation parameter Groups
US9507912B2 (en) 2012-08-31 2016-11-29 Nuvectra Corporation Method and system of simulating a pulse generator on a clinician programmer
US8812125B2 (en) 2012-08-31 2014-08-19 Greatbatch Ltd. Systems and methods for the identification and association of medical devices
US8868199B2 (en) 2012-08-31 2014-10-21 Greatbatch Ltd. System and method of compressing medical maps for pulse generator or database storage
US8903496B2 (en) 2012-08-31 2014-12-02 Greatbatch Ltd. Clinician programming system and method
US10668276B2 (en) 2012-08-31 2020-06-02 Cirtec Medical Corp. Method and system of bracketing stimulation parameters on clinician programmers
US9594877B2 (en) 2012-08-31 2017-03-14 Nuvectra Corporation Virtual reality representation of medical devices
US9259577B2 (en) 2012-08-31 2016-02-16 Greatbatch Ltd. Method and system of quick neurostimulation electrode configuration and positioning
US9180302B2 (en) 2012-08-31 2015-11-10 Greatbatch Ltd. Touch screen finger position indicator for a spinal cord stimulation programming device
US8983616B2 (en) 2012-09-05 2015-03-17 Greatbatch Ltd. Method and system for associating patient records with pulse generators
US8761897B2 (en) 2012-08-31 2014-06-24 Greatbatch Ltd. Method and system of graphical representation of lead connector block and implantable pulse generators on a clinician programmer
US8757485B2 (en) 2012-09-05 2014-06-24 Greatbatch Ltd. System and method for using clinician programmer and clinician programming data for inventory and manufacturing prediction and control
US9767255B2 (en) 2012-09-05 2017-09-19 Nuvectra Corporation Predefined input for clinician programmer data entry
US11308528B2 (en) 2012-09-14 2022-04-19 Sdl Netherlands B.V. Blueprinting of multimedia assets
US11386186B2 (en) 2012-09-14 2022-07-12 Sdl Netherlands B.V. External content library connector systems and methods
US10452740B2 (en) 2012-09-14 2019-10-22 Sdl Netherlands B.V. External content libraries
CN103685399B (en) * 2012-09-17 2018-03-23 腾讯科技(深圳)有限公司 A kind of methods, devices and systems for logging in class Unix virtual containers
US10021174B2 (en) 2012-09-25 2018-07-10 A10 Networks, Inc. Distributing service sessions
US9843484B2 (en) 2012-09-25 2017-12-12 A10 Networks, Inc. Graceful scaling in software driven networks
US9705800B2 (en) 2012-09-25 2017-07-11 A10 Networks, Inc. Load distribution in data networks
US10002141B2 (en) 2012-09-25 2018-06-19 A10 Networks, Inc. Distributed database in software driven networks
US8996551B2 (en) * 2012-10-01 2015-03-31 Longsand Limited Managing geographic region information
WO2014055772A1 (en) 2012-10-03 2014-04-10 Globesherpa, Inc. Mobile ticketing
US8862585B2 (en) * 2012-10-10 2014-10-14 Polytechnic Institute Of New York University Encoding non-derministic finite automation states efficiently in a manner that permits simple and fast union operations
US9213707B2 (en) * 2012-10-12 2015-12-15 Watson Manwaring Conner Ordered access of interrelated data files
US8954940B2 (en) * 2012-10-12 2015-02-10 International Business Machines Corporation Integrating preprocessor behavior into parsing
US9081900B2 (en) 2012-10-15 2015-07-14 Toyota Motor Engineering & Manufacturing North America, Inc. Systems and methods for mining temporal requirements from block diagram models of control systems
US9916306B2 (en) 2012-10-19 2018-03-13 Sdl Inc. Statistical linguistic analysis of source content
US9348677B2 (en) 2012-10-22 2016-05-24 Palantir Technologies Inc. System and method for batch evaluation programs
US9081975B2 (en) 2012-10-22 2015-07-14 Palantir Technologies, Inc. Sharing information between nexuses that use different classification schemes for information access control
US8943110B2 (en) * 2012-10-25 2015-01-27 Blackberry Limited Method and system for managing data storage and access on a client device
US9165006B2 (en) 2012-10-25 2015-10-20 Blackberry Limited Method and system for managing data storage and access on a client device
CN104769917B (en) * 2012-11-02 2018-03-27 通用电气智能平台有限公司 The apparatus and method that content accommodates
US9501761B2 (en) 2012-11-05 2016-11-22 Palantir Technologies, Inc. System and method for sharing investigation results
WO2014076731A1 (en) * 2012-11-13 2014-05-22 Hitachi, Ltd. Storage system, storage system control method, and storage control device
US8874617B2 (en) * 2012-11-14 2014-10-28 International Business Machines Corporation Determining potential enterprise partnerships
US9338225B2 (en) 2012-12-06 2016-05-10 A10 Networks, Inc. Forwarding policies on a virtual service network
US20140201629A1 (en) * 2013-01-17 2014-07-17 Microsoft Corporation Collaborative learning through user generated knowledge
US9531846B2 (en) 2013-01-23 2016-12-27 A10 Networks, Inc. Reducing buffer usage for TCP proxy session based on delayed acknowledgement
US9330659B2 (en) 2013-02-25 2016-05-03 Microsoft Technology Licensing, Llc Facilitating development of a spoken natural language interface
US9658999B2 (en) 2013-03-01 2017-05-23 Sony Corporation Language processing method and electronic device
US9900252B2 (en) 2013-03-08 2018-02-20 A10 Networks, Inc. Application delivery controller and global server load balancer
US9524273B2 (en) 2013-03-11 2016-12-20 Oracle International Corporation Method and system for generating a web page layout using nested drop zone widgets having different software functionalities
US11205036B2 (en) * 2013-03-11 2021-12-21 Oracle International Corporation Method and system for implementing contextual widgets
US9195712B2 (en) 2013-03-12 2015-11-24 Microsoft Technology Licensing, Llc Method of converting query plans to native code
US9152466B2 (en) * 2013-03-13 2015-10-06 Barracuda Networks, Inc. Organizing file events by their hierarchical paths for multi-threaded synch and parallel access system, apparatus, and method of operation
US10268639B2 (en) * 2013-03-15 2019-04-23 Inpixon Joining large database tables
WO2014144837A1 (en) 2013-03-15 2014-09-18 A10 Networks, Inc. Processing data packets using a policy based network path
US9740369B2 (en) 2013-03-15 2017-08-22 Palantir Technologies Inc. Systems and methods for providing a tagging interface for external content
US8909656B2 (en) 2013-03-15 2014-12-09 Palantir Technologies Inc. Filter chains with associated multipath views for exploring large data sets
US8930897B2 (en) 2013-03-15 2015-01-06 Palantir Technologies Inc. Data integration tool
US9996502B2 (en) * 2013-03-15 2018-06-12 Locus Lp High-dimensional systems databases for real-time prediction of interactions in a functional system
US10515123B2 (en) 2013-03-15 2019-12-24 Locus Lp Weighted analysis of stratified data entities in a database system
US9766832B2 (en) 2013-03-15 2017-09-19 Hitachi Data Systems Corporation Systems and methods of locating redundant data using patterns of matching fingerprints
US10235649B1 (en) 2014-03-14 2019-03-19 Walmart Apollo, Llc Customer analytics data model
US9990380B2 (en) * 2013-03-15 2018-06-05 Locus Lp Proximity search and navigation for functional information systems
CA2924083C (en) 2013-03-15 2020-06-30 Locus Analytics, Llc Syntactic tagging in a domain-specific context
US9530094B2 (en) 2013-03-15 2016-12-27 Yahoo! Inc. Jabba-type contextual tagger
US10599623B2 (en) * 2013-03-15 2020-03-24 Locus Lp Matching multidimensional projections of functional space
US9898167B2 (en) 2013-03-15 2018-02-20 Palantir Technologies Inc. Systems and methods for providing a tagging interface for external content
US9171207B1 (en) * 2013-03-15 2015-10-27 Peter L Olcott Method and system for recognizing machine generated character glyphs in graphic images
US9245299B2 (en) 2013-03-15 2016-01-26 Locus Lp Segmentation and stratification of composite portfolios of investment securities
US8903717B2 (en) 2013-03-15 2014-12-02 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8868486B2 (en) 2013-03-15 2014-10-21 Palantir Technologies Inc. Time-sensitive cube
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US9098878B2 (en) * 2013-03-15 2015-08-04 Locus, LP Stratified composite portfolios of investment securities
US9262555B2 (en) * 2013-03-15 2016-02-16 Yahoo! Inc. Machine for recognizing or generating Jabba-type sequences
US9767190B2 (en) 2013-04-23 2017-09-19 Black Hills Ip Holdings, Llc Patent claim scope evaluator
US9519914B2 (en) * 2013-04-30 2016-12-13 The Nielsen Company (Us), Llc Methods and apparatus to determine ratings information for online media presentations
US10038693B2 (en) 2013-05-03 2018-07-31 A10 Networks, Inc. Facilitating secure network traffic by an application delivery controller
US10027761B2 (en) 2013-05-03 2018-07-17 A10 Networks, Inc. Facilitating a secure 3 party network session by a network device
US9495436B2 (en) * 2013-05-30 2016-11-15 ClearStory Data Inc. Apparatus and method for ingesting and augmenting data
US10223637B1 (en) 2013-05-30 2019-03-05 Google Llc Predicting accuracy of submitted data
US20140358616A1 (en) * 2013-06-03 2014-12-04 International Business Machines Corporation Asset management for a computer-based system using aggregated weights of changed assets
US9256611B2 (en) 2013-06-06 2016-02-09 Sepaton, Inc. System and method for multi-scale navigation of data
US9779182B2 (en) * 2013-06-07 2017-10-03 Microsoft Technology Licensing, Llc Semantic grouping in search
WO2014197335A1 (en) 2013-06-08 2014-12-11 Apple Inc. Interpreting and acting upon commands that involve sharing information with remote devices
CN110442699A (en) 2013-06-09 2019-11-12 苹果公司 Operate method, computer-readable medium, electronic equipment and the system of digital assistants
US10176167B2 (en) 2013-06-09 2019-01-08 Apple Inc. System and method for inferring user intent from speech inputs
US9588956B2 (en) * 2013-07-12 2017-03-07 Ab Initio Technology Llc Parser generation
US10068246B2 (en) 2013-07-12 2018-09-04 The Nielsen Company (Us), Llc Methods and apparatus to collect distributed user information for media impressions
US9223773B2 (en) 2013-08-08 2015-12-29 Palatir Technologies Inc. Template system for custom document generation
IN2013MU02617A (en) * 2013-08-08 2015-06-12 Subramanian JAYAKUMAR
US9313294B2 (en) 2013-08-12 2016-04-12 The Nielsen Company (Us), Llc Methods and apparatus to de-duplicate impression information
US10223401B2 (en) 2013-08-15 2019-03-05 International Business Machines Corporation Incrementally retrieving data for objects to provide a desired level of detail
US9563399B2 (en) 2013-08-30 2017-02-07 Cavium, Inc. Generating a non-deterministic finite automata (NFA) graph for regular expression patterns with advanced features
US9367449B2 (en) * 2013-09-11 2016-06-14 Owtware Holdings Limited, BVI Hierarchical garbage collection in an object relational database system
JP2015060423A (en) * 2013-09-19 2015-03-30 株式会社東芝 Voice translation system, method of voice translation and program
US9767222B2 (en) 2013-09-27 2017-09-19 International Business Machines Corporation Information sets for data management
US8938686B1 (en) 2013-10-03 2015-01-20 Palantir Technologies Inc. Systems and methods for analyzing performance of an entity
JP6465372B2 (en) * 2013-10-09 2019-02-06 株式会社インタラクティブソリューションズ Mobile terminal device, slide information management system, and mobile terminal control method
US11790154B2 (en) 2013-10-09 2023-10-17 Interactive Solutions Corp. Mobile terminal device, slide information managing system, and a control method of mobile terminal
US9678973B2 (en) 2013-10-15 2017-06-13 Hitachi Data Systems Corporation Multi-node hybrid deduplication
US20150112708A1 (en) * 2013-10-23 2015-04-23 The Charlotte-Mecklenburg Hospital Authority D/B/A Carolinas Healthcare System Methods and systems for merging and analyzing healthcare data
US20150120224A1 (en) 2013-10-29 2015-04-30 C3 Energy, Inc. Systems and methods for processing data relating to energy usage
US9262136B2 (en) * 2013-11-07 2016-02-16 Netronome Systems, Inc. Allocate instruction and API call that contain a sybmol for a non-memory resource
MY170600A (en) 2013-11-27 2019-08-20 Mimos Berhad A method for converting a knowledge base to binary form
US10230770B2 (en) 2013-12-02 2019-03-12 A10 Networks, Inc. Network proxy layer for policy-based application proxies
US10296160B2 (en) 2013-12-06 2019-05-21 Apple Inc. Method for extracting salient dialog usage from live data
EP2881899B1 (en) 2013-12-09 2018-09-12 Deutsche Telekom AG System and method for automated aggregation of descriptions of individual object variants
US9105000B1 (en) 2013-12-10 2015-08-11 Palantir Technologies Inc. Aggregating data from a plurality of data sources
US10956947B2 (en) 2013-12-23 2021-03-23 The Nielsen Company (Us), Llc Methods and apparatus to measure media using media object characteristics
US9852163B2 (en) 2013-12-30 2017-12-26 The Nielsen Company (Us), Llc Methods and apparatus to de-duplicate impression information
US9237138B2 (en) 2013-12-31 2016-01-12 The Nielsen Company (Us), Llc Methods and apparatus to collect distributed user information for media impressions and search terms
US10147114B2 (en) 2014-01-06 2018-12-04 The Nielsen Company (Us), Llc Methods and apparatus to correct audience measurement data
US20150193816A1 (en) 2014-01-06 2015-07-09 The Nielsen Company (Us), Llc Methods and apparatus to correct misattributions of media impressions
US9729353B2 (en) * 2014-01-09 2017-08-08 Netronome Systems, Inc. Command-driven NFA hardware engine that encodes multiple automatons
US9602532B2 (en) 2014-01-31 2017-03-21 Cavium, Inc. Method and apparatus for optimizing finite automata processing
US9904630B2 (en) 2014-01-31 2018-02-27 Cavium, Inc. Finite automata processing based on a top of stack (TOS) memory
US11720599B1 (en) * 2014-02-13 2023-08-08 Pivotal Software, Inc. Clustering and visualizing alerts and incidents
US11809451B2 (en) * 2014-02-19 2023-11-07 Snowflake Inc. Caching systems and methods
US9009827B1 (en) 2014-02-20 2015-04-14 Palantir Technologies Inc. Security sharing system
US10474645B2 (en) 2014-02-24 2019-11-12 Microsoft Technology Licensing, Llc Automatically retrying transactions with split procedure execution
US9718558B2 (en) 2014-02-26 2017-08-01 Honeywell International Inc. Pilot centered system and method for decluttering aircraft displays
US10565538B1 (en) 2014-03-14 2020-02-18 Walmart Apollo, Llc Customer attribute exemption
US10235687B1 (en) * 2014-03-14 2019-03-19 Walmart Apollo, Llc Shortest distance to store
US10733555B1 (en) 2014-03-14 2020-08-04 Walmart Apollo, Llc Workflow coordinator
US10346769B1 (en) * 2014-03-14 2019-07-09 Walmart Apollo, Llc System and method for dynamic attribute table
US9990046B2 (en) 2014-03-17 2018-06-05 Oblong Industries, Inc. Visual collaboration interface
US8924429B1 (en) 2014-03-18 2014-12-30 Palantir Technologies Inc. Determining and extracting changed data from a data source
US10020979B1 (en) 2014-03-25 2018-07-10 A10 Networks, Inc. Allocating resources in multi-core computing environments
US9942152B2 (en) 2014-03-25 2018-04-10 A10 Networks, Inc. Forwarding data packets using a service-based forwarding policy
US9489576B2 (en) 2014-03-26 2016-11-08 F12 Solutions, LLC. Crop stand analysis
US9942162B2 (en) 2014-03-31 2018-04-10 A10 Networks, Inc. Active application response delay time
US10896421B2 (en) 2014-04-02 2021-01-19 Brighterion, Inc. Smart retail analytics and commercial messaging
US20180053114A1 (en) 2014-10-23 2018-02-22 Brighterion, Inc. Artificial intelligence for context classifier
US20150287336A1 (en) * 2014-04-04 2015-10-08 Bank Of America Corporation Automated phishing-email training
US10002326B2 (en) 2014-04-14 2018-06-19 Cavium, Inc. Compilation of finite automata based on memory hierarchy
US10110558B2 (en) 2014-04-14 2018-10-23 Cavium, Inc. Processing of finite automata based on memory hierarchy
US9535664B1 (en) * 2014-04-23 2017-01-03 William Knight Foster Computerized software development process and management environment
US11294665B1 (en) 2014-04-23 2022-04-05 William Knight Foster Computerized software version control with a software database and a human database
US9806943B2 (en) 2014-04-24 2017-10-31 A10 Networks, Inc. Enabling planned upgrade/downgrade of network devices without impacting network sessions
US9600599B2 (en) * 2014-05-13 2017-03-21 Spiral Genetics, Inc. Prefix burrows-wheeler transformation with fast operations on compressed data
US9906422B2 (en) 2014-05-16 2018-02-27 A10 Networks, Inc. Distributed system to determine a server's health
US9430463B2 (en) 2014-05-30 2016-08-30 Apple Inc. Exemplar-based natural language processing
US9966065B2 (en) 2014-05-30 2018-05-08 Apple Inc. Multi-command single utterance input method
US9633004B2 (en) 2014-05-30 2017-04-25 Apple Inc. Better resolution when referencing to concepts
US10170123B2 (en) 2014-05-30 2019-01-01 Apple Inc. Intelligent assistant for home automation
US9992229B2 (en) 2014-06-03 2018-06-05 A10 Networks, Inc. Programming a data network device using user defined scripts with licenses
US9986061B2 (en) 2014-06-03 2018-05-29 A10 Networks, Inc. Programming a data network device using user defined scripts
US10129122B2 (en) 2014-06-03 2018-11-13 A10 Networks, Inc. User defined objects for network devices
US10397371B2 (en) * 2014-06-09 2019-08-27 International Business Machines Corporation Saving and restoring a state of a web application
US9338493B2 (en) 2014-06-30 2016-05-10 Apple Inc. Intelligent automated assistant for TV user interactions
US10572496B1 (en) 2014-07-03 2020-02-25 Palantir Technologies Inc. Distributed workflow system and database with access controls for city resiliency
WO2016007923A1 (en) * 2014-07-11 2016-01-14 Craymer Loring G Iii Method and system for linear generalized ll recognition and context-aware parsing
US10311464B2 (en) 2014-07-17 2019-06-04 The Nielsen Company (Us), Llc Methods and apparatus to determine impressions corresponding to market segments
CN106716342B (en) 2014-07-24 2020-02-28 起元科技有限公司 Method and system for managing data lineage information and storage medium
US9398029B2 (en) 2014-08-01 2016-07-19 Wombat Security Technologies, Inc. Cybersecurity training system with automated application of branded content
US9906367B2 (en) * 2014-08-05 2018-02-27 Sap Se End-to-end tamper protection in presence of cloud integration
US20160055427A1 (en) 2014-10-15 2016-02-25 Brighterion, Inc. Method for providing data science, artificial intelligence and machine learning as-a-service
US20150032589A1 (en) 2014-08-08 2015-01-29 Brighterion, Inc. Artificial intelligence fraud management solution
US20150066771A1 (en) 2014-08-08 2015-03-05 Brighterion, Inc. Fast access vectors in real-time behavioral profiling
US10275458B2 (en) 2014-08-14 2019-04-30 International Business Machines Corporation Systematic tuning of text analytic annotators with specialized information
US20160063539A1 (en) 2014-08-29 2016-03-03 The Nielsen Company (Us), Llc Methods and apparatus to associate transactions with media impressions
US9818400B2 (en) 2014-09-11 2017-11-14 Apple Inc. Method and apparatus for discovering trending terms in speech requests
US10516980B2 (en) * 2015-10-24 2019-12-24 Oracle International Corporation Automatic redisplay of a user interface including a visualization
US10108931B2 (en) * 2014-09-26 2018-10-23 Oracle International Corporation Lock-based updating of a document
US10074360B2 (en) 2014-09-30 2018-09-11 Apple Inc. Providing an indication of the suitability of speech recognition
US10127911B2 (en) 2014-09-30 2018-11-13 Apple Inc. Speaker identification and unsupervised speaker adaptation techniques
US10628379B1 (en) 2014-09-30 2020-04-21 EMC IP Holding Company LLC Efficient local data protection of application data in storage environments
US10613755B1 (en) 2014-09-30 2020-04-07 EMC IP Holding Company LLC Efficient repurposing of application data in storage environments
US9668121B2 (en) 2014-09-30 2017-05-30 Apple Inc. Social reminders
US11080709B2 (en) 2014-10-15 2021-08-03 Brighterion, Inc. Method of reducing financial losses in multiple payment channels upon a recognition of fraud first appearing in any one payment channel
US20160078367A1 (en) 2014-10-15 2016-03-17 Brighterion, Inc. Data clean-up method for improving predictive model training
US20160063502A1 (en) 2014-10-15 2016-03-03 Brighterion, Inc. Method for improving operating profits with better automated decision making with artificial intelligence
US10546099B2 (en) 2014-10-15 2020-01-28 Brighterion, Inc. Method of personalizing, individualizing, and automating the management of healthcare fraud-waste-abuse to unique individual healthcare providers
US10290001B2 (en) 2014-10-28 2019-05-14 Brighterion, Inc. Data breach detection
US9229952B1 (en) 2014-11-05 2016-01-05 Palantir Technologies, Inc. History preserving data pipeline system and method
US10373062B2 (en) * 2014-12-12 2019-08-06 Omni Ai, Inc. Mapper component for a neuro-linguistic behavior recognition system
US9792604B2 (en) 2014-12-19 2017-10-17 moovel North Americ, LLC Method and system for dynamically interactive visually validated mobile ticketing
CA3128834C (en) 2015-01-02 2023-11-14 Systech Corporation Control infrastructure
US9417850B2 (en) * 2015-01-10 2016-08-16 Logics Research Centre Grace˜operator for changing order and scope of implicit parameters
US11106871B2 (en) * 2015-01-23 2021-08-31 Conversica, Inc. Systems and methods for configurable messaging response-action engine
TWI567679B (en) * 2015-01-23 2017-01-21 羅瑞 里奇士 A computer-implemented method and system for constructing a representation of investment securities in a database
US9922037B2 (en) 2015-01-30 2018-03-20 Splunk Inc. Index time, delimiter based extractions and previewing for use in indexing
US9454157B1 (en) 2015-02-07 2016-09-27 Usman Hafeez System and method for controlling flight operations of an unmanned aerial vehicle
US9454907B2 (en) 2015-02-07 2016-09-27 Usman Hafeez System and method for placement of sensors through use of unmanned aerial vehicles
SG11201706195YA (en) * 2015-02-11 2017-08-30 Ab Initio Technology Llc Filtering data lineage diagrams
WO2016130626A1 (en) * 2015-02-11 2016-08-18 Ab Initio Technology Llc Filtering data lineage diagrams
US10489463B2 (en) * 2015-02-12 2019-11-26 Microsoft Technology Licensing, Llc Finding documents describing solutions to computing issues
US10803106B1 (en) 2015-02-24 2020-10-13 Palantir Technologies Inc. System with methodology for dynamic modular ontology
US9727560B2 (en) 2015-02-25 2017-08-08 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
CN104599623B (en) * 2015-02-27 2017-07-04 京东方科技集团股份有限公司 A kind of method for displaying image, device and electronic equipment
US10152299B2 (en) 2015-03-06 2018-12-11 Apple Inc. Reducing response latency of intelligent automated assistants
US9721566B2 (en) 2015-03-08 2017-08-01 Apple Inc. Competing devices responding to voice triggers
US10567477B2 (en) 2015-03-08 2020-02-18 Apple Inc. Virtual assistant continuity
US9886953B2 (en) 2015-03-08 2018-02-06 Apple Inc. Virtual assistant activation
US9836599B2 (en) * 2015-03-13 2017-12-05 Microsoft Technology Licensing, Llc Implicit process detection and automation from unstructured activity
US9830603B2 (en) 2015-03-20 2017-11-28 Microsoft Technology Licensing, Llc Digital identity and authorization for machines with replaceable parts
US20180130006A1 (en) 2015-03-31 2018-05-10 Brighterion, Inc. Addrressable smart agent data technology to detect unauthorized transaction activity
US11775656B2 (en) 2015-05-01 2023-10-03 Micro Focus Llc Secure multi-party information retrieval
WO2016188591A1 (en) 2015-05-22 2016-12-01 Longsand Limited Semantic consolidation of data received from customers and enterprises
US10083688B2 (en) 2015-05-27 2018-09-25 Apple Inc. Device voice control for selecting a displayed affordance
US9578173B2 (en) 2015-06-05 2017-02-21 Apple Inc. Virtual assistant aided communication with 3rd party service in a communication session
CA3128629A1 (en) 2015-06-05 2016-07-28 C3.Ai, Inc. Systems and methods for data processing and enterprise ai applications
US11025565B2 (en) 2015-06-07 2021-06-01 Apple Inc. Personalized prediction of responses for instant messaging
US9891933B2 (en) 2015-06-24 2018-02-13 International Business Machines Corporation Automated testing of GUI mirroring
US10380633B2 (en) 2015-07-02 2019-08-13 The Nielsen Company (Us), Llc Methods and apparatus to generate corrected online audience measurement data
US10045082B2 (en) 2015-07-02 2018-08-07 The Nielsen Company (Us), Llc Methods and apparatus to correct errors in audience measurements for media accessed using over-the-top devices
US10803766B1 (en) 2015-07-28 2020-10-13 Architecture Technology Corporation Modular training of network-based training exercises
US10083624B2 (en) 2015-07-28 2018-09-25 Architecture Technology Corporation Real-time monitoring of network-based training exercises
US9996595B2 (en) 2015-08-03 2018-06-12 Palantir Technologies, Inc. Providing full data provenance visualization for versioned datasets
US10089687B2 (en) * 2015-08-04 2018-10-02 Fidelity National Information Services, Inc. System and associated methodology of creating order lifecycles via daisy chain linkage
US10581976B2 (en) 2015-08-12 2020-03-03 A10 Networks, Inc. Transmission control of protocol state exchange for dynamic stateful service insertion
US10243791B2 (en) 2015-08-13 2019-03-26 A10 Networks, Inc. Automated adjustment of subscriber policies
CN106470360B (en) * 2015-08-20 2019-12-10 腾讯科技(深圳)有限公司 Video player calling method and device
US10853378B1 (en) 2015-08-25 2020-12-01 Palantir Technologies Inc. Electronic note management via a connected entity graph
US10102280B2 (en) * 2015-08-31 2018-10-16 International Business Machines Corporation Determination of expertness level for a target keyword
US9576015B1 (en) 2015-09-09 2017-02-21 Palantir Technologies, Inc. Domain-specific language for dataset transformations
CN106557531B (en) 2015-09-30 2020-07-03 伊姆西Ip控股有限责任公司 Method, apparatus and storage medium for converting complex structured objects into flattened data
US10922418B2 (en) 2015-10-01 2021-02-16 Twistlock, Ltd. Runtime detection and mitigation of vulnerabilities in application software containers
US10943014B2 (en) 2015-10-01 2021-03-09 Twistlock, Ltd Profiling of spawned processes in container images and enforcing security policies respective thereof
US10567411B2 (en) 2015-10-01 2020-02-18 Twistlock, Ltd. Dynamically adapted traffic inspection and filtering in containerized environments
US10693899B2 (en) * 2015-10-01 2020-06-23 Twistlock, Ltd. Traffic enforcement in containerized environments
US10664590B2 (en) * 2015-10-01 2020-05-26 Twistlock, Ltd. Filesystem action profiling of containers and security enforcement
US10586042B2 (en) * 2015-10-01 2020-03-10 Twistlock, Ltd. Profiling of container images and enforcing security policies respective thereof
US10915628B2 (en) 2015-10-01 2021-02-09 Twistlock, Ltd. Runtime detection of vulnerabilities in an application layer of software containers
RU2611257C1 (en) * 2015-10-01 2017-02-21 Акционерное общество "Калужский научно-исследовательский институт телемеханических устройств" Method of preparation, storage and transfer of operational and command information in telecode control complexes
US10223534B2 (en) 2015-10-15 2019-03-05 Twistlock, Ltd. Static detection of vulnerabilities in base images of software containers
US10599833B2 (en) 2015-10-01 2020-03-24 Twistlock, Ltd. Networking-based profiling of containers and security enforcement
US10599718B2 (en) * 2015-10-09 2020-03-24 Software Ag Systems and/or methods for graph based declarative mapping
US10778446B2 (en) 2015-10-15 2020-09-15 Twistlock, Ltd. Detection of vulnerable root certificates in software containers
WO2017075546A1 (en) * 2015-10-28 2017-05-04 Hrl Laboratories, Llc System and method for maintaining security tags and reference counts for objects in computer memory
US10614167B2 (en) 2015-10-30 2020-04-07 Sdl Plc Translation review workflow systems and methods
US10346446B2 (en) 2015-11-02 2019-07-09 Radiant Geospatial Solutions Llc System and method for aggregating multi-source data and identifying geographic areas for data acquisition
US10783268B2 (en) 2015-11-10 2020-09-22 Hewlett Packard Enterprise Development Lp Data allocation based on secure information retrieval
US10282376B2 (en) * 2015-11-10 2019-05-07 The United States Of America, As Represented By The Secretary Of The Navy Semi-structured spatial data conversion
US9740601B2 (en) * 2015-12-01 2017-08-22 International Business Machines Corporation Globalization testing management service configuration
US9767011B2 (en) 2015-12-01 2017-09-19 International Business Machines Corporation Globalization testing management using a set of globalization testing operations
US10049668B2 (en) 2015-12-02 2018-08-14 Apple Inc. Applying neural network language models to weighted finite state transducers for automatic speech recognition
US10205994B2 (en) 2015-12-17 2019-02-12 The Nielsen Company (Us), Llc Methods and apparatus to collect distributed user information for media impressions
WO2017116259A1 (en) * 2015-12-28 2017-07-06 Limited Liability Company Mail.Ru Dynamic contextual re-ordering of suggested query hints
US10318288B2 (en) 2016-01-13 2019-06-11 A10 Networks, Inc. System and method to process a chain of network applications
US10270673B1 (en) 2016-01-27 2019-04-23 The Nielsen Company (Us), Llc Methods and apparatus for estimating total unique audiences
US9715375B1 (en) * 2016-01-27 2017-07-25 International Business Machines Corporation Parallel compilation of software application
CN105511890B (en) * 2016-01-29 2018-02-23 腾讯科技(深圳)有限公司 A kind of graphical interfaces update method and device
US10248722B2 (en) 2016-02-22 2019-04-02 Palantir Technologies Inc. Multi-language support for dynamic ontology
US10698938B2 (en) 2016-03-18 2020-06-30 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US11263650B2 (en) * 2016-04-25 2022-03-01 [24]7.ai, Inc. Process and system to categorize, evaluate and optimize a customer experience
US10394552B2 (en) * 2016-05-17 2019-08-27 Dropbox, Inc. Interface description language for application programming interfaces
US11481537B2 (en) 2016-05-27 2022-10-25 Open Text Sa Ulc Document architecture with smart rendering
US10621370B2 (en) * 2016-05-27 2020-04-14 Intel Corporation Methods and apparatus to provide group-based row-level security for big data platforms
US10049663B2 (en) 2016-06-08 2018-08-14 Apple, Inc. Intelligent automated assistant for media exploration
US10567460B2 (en) * 2016-06-09 2020-02-18 Apple Inc. Managing data using a time-based directory structure
US10586535B2 (en) 2016-06-10 2020-03-10 Apple Inc. Intelligent digital assistant in a multi-tasking environment
DK179415B1 (en) 2016-06-11 2018-06-14 Apple Inc Intelligent device arbitration and control
DK201670540A1 (en) 2016-06-11 2018-01-08 Apple Inc Application integration with a digital assistant
US10007674B2 (en) 2016-06-13 2018-06-26 Palantir Technologies Inc. Data revision control in large-scale data analytic systems
TWI579718B (en) * 2016-06-15 2017-04-21 陳兆煒 System and Methods for Graphical Resources Management Application for Graphical Resources Management
CN107545008B (en) * 2016-06-27 2021-02-19 五八同城信息技术有限公司 Data format requirement storage method and device
US20180011910A1 (en) * 2016-07-06 2018-01-11 Facebook, Inc. Systems and methods for performing operations with data acquired from multiple sources
US10529302B2 (en) 2016-07-07 2020-01-07 Oblong Industries, Inc. Spatially mediated augmentations of and interactions among distinct devices and applications via extended pixel manifold
GB2553656B (en) 2016-07-14 2020-11-18 Securitymetrics Inc Identification of potentially sensitive information in data strings
US10725896B2 (en) 2016-07-15 2020-07-28 Intuit Inc. System and method for identifying a subset of total historical users of a document preparation system to represent a full set of test scenarios based on code coverage
US20180018322A1 (en) * 2016-07-15 2018-01-18 Intuit Inc. System and method for automatically understanding lines of compliance forms through natural language patterns
US10579721B2 (en) 2016-07-15 2020-03-03 Intuit Inc. Lean parsing: a natural language processing system and method for parsing domain-specific languages
US10503808B2 (en) * 2016-07-15 2019-12-10 Sap Se Time user interface with intelligent text reduction
US10140260B2 (en) * 2016-07-15 2018-11-27 Sap Se Intelligent text reduction for graphical interface elements
US11049190B2 (en) 2016-07-15 2021-06-29 Intuit Inc. System and method for automatically generating calculations for fields in compliance forms
US11222266B2 (en) 2016-07-15 2022-01-11 Intuit Inc. System and method for automatic learning of functions
US20180145701A1 (en) * 2016-09-01 2018-05-24 Anthony Ben Benavides Sonic Boom: System For Reducing The Digital Footprint Of Data Streams Through Lossless Scalable Binary Substitution
US10474753B2 (en) 2016-09-07 2019-11-12 Apple Inc. Language identification using recurrent neural networks
US10043516B2 (en) 2016-09-23 2018-08-07 Apple Inc. Intelligent automated assistant
US9830345B1 (en) * 2016-09-26 2017-11-28 Semmle Limited Content-addressable data storage
US11080301B2 (en) 2016-09-28 2021-08-03 Hewlett Packard Enterprise Development Lp Storage allocation based on secure data comparisons via multiple intermediaries
WO2018066083A1 (en) * 2016-10-04 2018-04-12 富士通株式会社 Learning program, information processing device and learning method
US11727288B2 (en) 2016-10-05 2023-08-15 Kyndryl, Inc. Database-management system with artificially intelligent virtual database administration
US10102229B2 (en) 2016-11-09 2018-10-16 Palantir Technologies Inc. Validating data integrations using a secondary data store
US10268345B2 (en) * 2016-11-17 2019-04-23 General Electric Company Mehtod and system for multi-modal lineage tracing and impact assessment in a concept lineage data flow network
US11281993B2 (en) 2016-12-05 2022-03-22 Apple Inc. Model and ensemble compression for metric learning
US10783158B2 (en) * 2016-12-19 2020-09-22 Datalogic IP Tech, S.r.l. Method and algorithms for auto-identification data mining through dynamic hyperlink search analysis
US9946777B1 (en) 2016-12-19 2018-04-17 Palantir Technologies Inc. Systems and methods for facilitating data transformation
US20220277304A1 (en) * 2017-01-04 2022-09-01 Jpmorgan Chase Bank, N.A. Systems and Methods for Sanction Management
US9922108B1 (en) 2017-01-05 2018-03-20 Palantir Technologies Inc. Systems and methods for facilitating data transformation
US11204787B2 (en) 2017-01-09 2021-12-21 Apple Inc. Application integration with a digital assistant
US10389835B2 (en) 2017-01-10 2019-08-20 A10 Networks, Inc. Application aware systems and methods to process user loadable network applications
US10528415B2 (en) 2017-02-28 2020-01-07 International Business Machines Corporation Guided troubleshooting with autofilters
US11163616B2 (en) 2017-03-07 2021-11-02 Polyjuice Ab Systems and methods for enabling interoperation of independent software applications
US10592277B2 (en) 2017-03-24 2020-03-17 Oracle International Corporation System and method for determining the success of a cross-platform application migration
WO2018176356A1 (en) * 2017-03-31 2018-10-04 Oracle International Corporation System and method for determining the success of a cross-platform application migration
US11592817B2 (en) * 2017-04-28 2023-02-28 Intel Corporation Storage management for machine learning at autonomous machines
DK201770383A1 (en) 2017-05-09 2018-12-14 Apple Inc. User interface for correcting recognition errors
US10417266B2 (en) 2017-05-09 2019-09-17 Apple Inc. Context-aware ranking of intelligent response suggestions
US10395654B2 (en) 2017-05-11 2019-08-27 Apple Inc. Text normalization based on a data-driven learning network
DK201770439A1 (en) 2017-05-11 2018-12-13 Apple Inc. Offline personal assistant
US10726832B2 (en) 2017-05-11 2020-07-28 Apple Inc. Maintaining privacy of personal information
US11301477B2 (en) 2017-05-12 2022-04-12 Apple Inc. Feedback analysis of a digital assistant
DK179745B1 (en) 2017-05-12 2019-05-01 Apple Inc. SYNCHRONIZATION AND TASK DELEGATION OF A DIGITAL ASSISTANT
DK179496B1 (en) 2017-05-12 2019-01-15 Apple Inc. USER-SPECIFIC Acoustic Models
DK201770429A1 (en) 2017-05-12 2018-12-14 Apple Inc. Low-latency intelligent automated assistant
DK201770432A1 (en) 2017-05-15 2018-12-21 Apple Inc. Hierarchical belief states for digital assistants
DK201770431A1 (en) 2017-05-15 2018-12-20 Apple Inc. Optimizing dialogue policy decisions for digital assistants using implicit feedback
US10311144B2 (en) 2017-05-16 2019-06-04 Apple Inc. Emoji word sense disambiguation
US10403278B2 (en) 2017-05-16 2019-09-03 Apple Inc. Methods and systems for phonetic matching in digital assistant services
US10303715B2 (en) 2017-05-16 2019-05-28 Apple Inc. Intelligent automated assistant for media exploration
DK179549B1 (en) 2017-05-16 2019-02-12 Apple Inc. Far-field extension for digital assistant services
US10379825B2 (en) 2017-05-22 2019-08-13 Ab Initio Technology Llc Automated dependency analyzer for heterogeneously programmed data processing system
US10243904B1 (en) 2017-05-26 2019-03-26 Wombat Security Technologies, Inc. Determining authenticity of reported user action in cybersecurity risk assessment
KR101926977B1 (en) * 2017-05-29 2019-03-07 연세대학교 산학협력단 Method for Creating Automata for determination of Nested-duplication
US11222076B2 (en) * 2017-05-31 2022-01-11 Microsoft Technology Licensing, Llc Data set state visualization comparison lock
US10657328B2 (en) 2017-06-02 2020-05-19 Apple Inc. Multi-task recurrent neural network architecture for efficient morphology handling in neural language modeling
US10956406B2 (en) 2017-06-12 2021-03-23 Palantir Technologies Inc. Propagated deletion of database records and derived data
US10524165B2 (en) 2017-06-22 2019-12-31 Bank Of America Corporation Dynamic utilization of alternative resources based on token association
US10511692B2 (en) 2017-06-22 2019-12-17 Bank Of America Corporation Data transmission to a networked resource based on contextual information
US10481881B2 (en) * 2017-06-22 2019-11-19 Archeo Futurus, Inc. Mapping a computer code to wires and gates
US10313480B2 (en) 2017-06-22 2019-06-04 Bank Of America Corporation Data transmission between networked resources
US9996328B1 (en) * 2017-06-22 2018-06-12 Archeo Futurus, Inc. Compiling and optimizing a computer code by minimizing a number of states in a finite machine corresponding to the computer code
US10824870B2 (en) 2017-06-29 2020-11-03 Accenture Global Solutions Limited Natural language eminence based robotic agent control
US10691729B2 (en) 2017-07-07 2020-06-23 Palantir Technologies Inc. Systems and methods for providing an object platform for a relational database
CN110019350B (en) * 2017-07-28 2021-06-29 北京京东尚科信息技术有限公司 Data query method and device based on configuration information
US10599129B2 (en) * 2017-08-04 2020-03-24 Duro Labs, Inc. Method for data normalization
CN107391890B (en) * 2017-09-01 2020-10-09 山东永利精工石油装备有限公司 Prediction and optimal control method for oil casing threaded joint machining chatter defect
US10545742B2 (en) * 2017-09-06 2020-01-28 Nicira, Inc. Annotation-driven framework for generating state machine updates
US10445429B2 (en) 2017-09-21 2019-10-15 Apple Inc. Natural language understanding using vocabularies with compressed serialized tries
US10755051B2 (en) 2017-09-29 2020-08-25 Apple Inc. Rule-based natural language processing
RU2658147C1 (en) * 2017-10-05 2018-06-19 федеральное государственное автономное образовательное учреждение высшего образования "Национальный исследовательский ядерный университет "МИФИ" (НИЯУ МИФИ) Data decompression device
US11295232B2 (en) * 2017-10-30 2022-04-05 Microsoft Technology Licensing, Llc Learning the structure of hierarchical extraction models
US10635863B2 (en) 2017-10-30 2020-04-28 Sdl Inc. Fragment recall and adaptive automated translation
US20190138623A1 (en) * 2017-11-03 2019-05-09 Drishti Technologies, Inc. Automated birth certificate systems and methods
US10956508B2 (en) 2017-11-10 2021-03-23 Palantir Technologies Inc. Systems and methods for creating and managing a data integration workspace containing automatically updated data models
CN110741389A (en) 2017-11-21 2020-01-31 谷歌有限责任公司 Improved data communication of entities
US10636424B2 (en) 2017-11-30 2020-04-28 Apple Inc. Multi-turn canned dialog
CN107948181A (en) * 2017-12-06 2018-04-20 吉旗(成都)科技有限公司 A kind of expansible data word description scheme method
US10599766B2 (en) 2017-12-15 2020-03-24 International Business Machines Corporation Symbolic regression embedding dimensionality analysis
US10817676B2 (en) 2017-12-27 2020-10-27 Sdl Inc. Intelligent routing services and systems
JP2019117571A (en) * 2017-12-27 2019-07-18 シャープ株式会社 Information processing apparatus, information processing system, information processing method and program
US10733982B2 (en) 2018-01-08 2020-08-04 Apple Inc. Multi-directional dialog
US10733375B2 (en) 2018-01-31 2020-08-04 Apple Inc. Knowledge-based framework for improving natural language understanding
EP3521948A1 (en) 2018-02-06 2019-08-07 Tata Consultancy Services Limited Systems and methods for auto-generating a control and monitoring solution for smart and robotics environments
CN108471401A (en) * 2018-02-07 2018-08-31 山东省科学院自动化研究所 A kind of encapsulation of CAN signal, analysis method and device
US10606954B2 (en) 2018-02-15 2020-03-31 International Business Machines Corporation Topic kernelization for real-time conversation data
US11182565B2 (en) * 2018-02-23 2021-11-23 Samsung Electronics Co., Ltd. Method to learn personalized intents
US10789959B2 (en) 2018-03-02 2020-09-29 Apple Inc. Training speaker recognition models for digital assistants
US10592604B2 (en) 2018-03-12 2020-03-17 Apple Inc. Inverse text normalization for automatic speech recognition
US20190294735A1 (en) * 2018-03-26 2019-09-26 Apple Inc. Search functions for spreadsheets
US11327993B2 (en) * 2018-03-26 2022-05-10 Verizon Patent And Licensing Inc. Systems and methods for managing and delivering digital content
US10818288B2 (en) 2018-03-26 2020-10-27 Apple Inc. Natural assistant interaction
US10909331B2 (en) 2018-03-30 2021-02-02 Apple Inc. Implicit identification of translation payload with neural machine translation
US10754822B1 (en) 2018-04-18 2020-08-25 Palantir Technologies Inc. Systems and methods for ontology migration
US20190342297A1 (en) * 2018-05-01 2019-11-07 Brighterion, Inc. Securing internet-of-things with smart-agent technology
US10928918B2 (en) 2018-05-07 2021-02-23 Apple Inc. Raise to speak
US11145294B2 (en) 2018-05-07 2021-10-12 Apple Inc. Intelligent automated assistant for delivering content from user experiences
US11461355B1 (en) 2018-05-15 2022-10-04 Palantir Technologies Inc. Ontological mapping of data
US10984780B2 (en) 2018-05-21 2021-04-20 Apple Inc. Global semantic word embeddings using bi-directional recurrent neural networks
US11314940B2 (en) 2018-05-22 2022-04-26 Samsung Electronics Co., Ltd. Cross domain personalized vocabulary learning in intelligent assistants
DK179822B1 (en) 2018-06-01 2019-07-12 Apple Inc. Voice interaction at a primary device to access call functionality of a companion device
DK201870355A1 (en) 2018-06-01 2019-12-16 Apple Inc. Virtual assistant operation in multi-device environments
US10892996B2 (en) 2018-06-01 2021-01-12 Apple Inc. Variable latency device coordination
US11386266B2 (en) 2018-06-01 2022-07-12 Apple Inc. Text correction
DK180639B1 (en) 2018-06-01 2021-11-04 Apple Inc DISABILITY OF ATTENTION-ATTENTIVE VIRTUAL ASSISTANT
US10496705B1 (en) 2018-06-03 2019-12-03 Apple Inc. Accelerated task performance
US11568142B2 (en) 2018-06-04 2023-01-31 Infosys Limited Extraction of tokens and relationship between tokens from documents to form an entity relationship map
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US10855711B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US10817604B1 (en) 2018-06-19 2020-10-27 Architecture Technology Corporation Systems and methods for processing source codes to detect non-malicious faults
US10749890B1 (en) 2018-06-19 2020-08-18 Architecture Technology Corporation Systems and methods for improving the ranking and prioritization of attack-related events
US11308038B2 (en) * 2018-06-22 2022-04-19 Red Hat, Inc. Copying container images
US10893008B2 (en) * 2018-08-30 2021-01-12 Koopid, Inc System and method for generating and communicating communication components over a messaging channel
US11256867B2 (en) 2018-10-09 2022-02-22 Sdl Inc. Systems and methods of machine learning for digital assets and message creation
US10699069B2 (en) * 2018-10-11 2020-06-30 International Business Machines Corporation Populating spreadsheets using relational information from documents
US10691304B1 (en) 2018-10-22 2020-06-23 Tableau Software, Inc. Data preparation user interface with conglomerate heterogeneous process flow elements
US10691428B2 (en) * 2018-10-24 2020-06-23 Sap Se Digital compliance platform
RU2697618C1 (en) * 2018-10-30 2019-08-15 федеральное государственное автономное образовательное учреждение высшего образования "Национальный исследовательский ядерный университет МИФИ" (НИЯУ МИФИ) Device for decompression of data
CN109299131B (en) * 2018-11-14 2020-05-29 百度在线网络技术(北京)有限公司 Spark query method and system supporting trusted computing
WO2020132173A1 (en) 2018-12-19 2020-06-25 John Rankin Hidden electronic file systems
US10901739B2 (en) 2019-01-21 2021-01-26 Rankin Labs, Llc Systems and methods for controlling machine operations using stack entries comprising instruction configuration parameters
US11108671B2 (en) 2019-01-21 2021-08-31 Rankin Labs, Llc Systems and methods for processing network traffic using dynamic memory
US11526357B2 (en) 2019-01-21 2022-12-13 Rankin Labs, Llc Systems and methods for controlling machine operations within a multi-dimensional memory space
US11429713B1 (en) 2019-01-24 2022-08-30 Architecture Technology Corporation Artificial intelligence modeling for cyber-attack simulation protocols
US11128654B1 (en) 2019-02-04 2021-09-21 Architecture Technology Corporation Systems and methods for unified hierarchical cybersecurity
US11775505B2 (en) 2019-04-03 2023-10-03 Unitedhealth Group Incorporated Managing data objects for graph-based data structures
WO2020214757A1 (en) 2019-04-17 2020-10-22 John Rankin Virtual memory pool within a network which is accessible from multiple platforms
US11887505B1 (en) 2019-04-24 2024-01-30 Architecture Technology Corporation System for deploying and monitoring network-based training exercises
WO2020227434A1 (en) 2019-05-07 2020-11-12 Cerebri AI Inc. Predictive, machine-learning, locale-aware computer models suitable for location- and trajectory-aware training sets
US20200356866A1 (en) * 2019-05-08 2020-11-12 International Business Machines Corporation Operative enterprise application recommendation generated by cognitive services from unstructured requirements
US11163956B1 (en) 2019-05-23 2021-11-02 Intuit Inc. System and method for recognizing domain specific named entities using domain specific word embeddings
WO2020243244A1 (en) 2019-05-28 2020-12-03 John Rankin Supporting a virtual memory area at a remote computing machine
CN110188106B (en) * 2019-05-31 2021-04-16 北京明朝万达科技股份有限公司 Data management method and device
CN110222143B (en) * 2019-05-31 2022-11-04 北京小米移动软件有限公司 Character string matching method, device, storage medium and electronic equipment
US10977268B2 (en) * 2019-05-31 2021-04-13 Snowflake Inc. Data exchange
US11620389B2 (en) 2019-06-24 2023-04-04 University Of Maryland Baltimore County Method and system for reducing false positives in static source code analysis reports using machine learning and classification techniques
US11403405B1 (en) 2019-06-27 2022-08-02 Architecture Technology Corporation Portable vulnerability identification tool for embedded non-IP devices
US10489454B1 (en) * 2019-06-28 2019-11-26 Capital One Services, Llc Indexing a dataset based on dataset tags and an ontology
US11531703B2 (en) 2019-06-28 2022-12-20 Capital One Services, Llc Determining data categorizations based on an ontology and a machine-learning model
CN112230909B (en) * 2019-07-15 2023-05-23 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for binding data of applet
JP7298692B2 (en) * 2019-08-08 2023-06-27 日本電気株式会社 Function estimation device, function estimation method and program
US20220342879A1 (en) * 2019-10-08 2022-10-27 Nec Corporation Data searching system, device, method and program
US11269942B2 (en) * 2019-10-10 2022-03-08 International Business Machines Corporation Automatic keyphrase extraction from text using the cross-entropy method
US11194840B2 (en) 2019-10-14 2021-12-07 Microsoft Technology Licensing, Llc Incremental clustering for enterprise knowledge graph
US11709878B2 (en) 2019-10-14 2023-07-25 Microsoft Technology Licensing, Llc Enterprise knowledge graph
US11444974B1 (en) 2019-10-23 2022-09-13 Architecture Technology Corporation Systems and methods for cyber-physical threat modeling
US11216492B2 (en) * 2019-10-31 2022-01-04 Microsoft Technology Licensing, Llc Document annotation based on enterprise knowledge graph
CN110853327B (en) * 2019-11-02 2021-04-02 杭州雅格纳科技有限公司 Ship cabin equipment data field debugging and collecting method and device based on single chip microcomputer
US11222166B2 (en) * 2019-11-19 2022-01-11 International Business Machines Corporation Iteratively expanding concepts
WO2021113626A1 (en) 2019-12-06 2021-06-10 John Rankin High-level programming language which utilizes virtual memory
US11503075B1 (en) 2020-01-14 2022-11-15 Architecture Technology Corporation Systems and methods for continuous compliance of nodes
US10841251B1 (en) * 2020-02-11 2020-11-17 Moveworks, Inc. Multi-domain chatbot
US11783128B2 (en) 2020-02-19 2023-10-10 Intuit Inc. Financial document text conversion to computer readable operations
US10814489B1 (en) * 2020-02-28 2020-10-27 Nimble Robotics, Inc. System and method of integrating robot into warehouse management software
CN115244539B (en) * 2020-05-18 2023-08-01 谷歌有限责任公司 Inference method for tokenization of words or word segments
KR102565455B1 (en) 2020-05-24 2023-08-08 킥소틱 랩스 인크. Domain-specific language interpreter and interactive visual interface for rapid screening
US11734590B2 (en) 2020-06-16 2023-08-22 Northrop Grumman Systems Corporation System and method for automating observe-orient-decide-act (OODA) loop enabling cognitive autonomous agent systems
WO2021262180A1 (en) * 2020-06-25 2021-12-30 Hints Inc. System and method for detecting misinformation and fake news via network analysis
US11620280B2 (en) * 2020-08-19 2023-04-04 Palantir Technologies Inc. Projections for big database systems
CN112073521B (en) * 2020-09-10 2022-09-02 成都中科大旗软件股份有限公司 Sharing scheduling method and system for scattered data
US11861039B1 (en) 2020-09-28 2024-01-02 Amazon Technologies, Inc. Hierarchical system and method for identifying sensitive content in data
US11461103B2 (en) * 2020-10-23 2022-10-04 Centaur Technology, Inc. Dual branch execute and table update with single port
US11556558B2 (en) 2021-01-11 2023-01-17 International Business Machines Corporation Insight expansion in smart data retention systems
US11494418B2 (en) * 2021-01-28 2022-11-08 The Florida International University Board Of Trustees Systems and methods for determining document section types
CN113505127A (en) * 2021-06-22 2021-10-15 侍意(厦门)网络信息技术有限公司 Storage structure and method for data of related objects, retrieval and visual display method
CN113535813B (en) * 2021-06-30 2023-07-28 北京百度网讯科技有限公司 Data mining method and device, electronic equipment and storage medium
US11411805B1 (en) 2021-07-12 2022-08-09 Bank Of America Corporation System and method for detecting root cause of an exception error in a task flow in a distributed network
CN113901763A (en) * 2021-09-30 2022-01-07 北京百度网讯科技有限公司 Table description text generation method, device, equipment and storage medium
US20230229998A1 (en) * 2022-01-20 2023-07-20 Copperleaf Technologies Inc. Methods and systems for asset management using customized calculation module
US11888793B2 (en) 2022-02-22 2024-01-30 Open Text Holdings, Inc. Systems and methods for intelligent delivery of communications
US11438251B1 (en) 2022-02-28 2022-09-06 Bank Of America Corporation System and method for automatic self-resolution of an exception error in a distributed network
US11892937B2 (en) 2022-02-28 2024-02-06 Bank Of America Corporation Developer test environment with containerization of tightly coupled systems
US11868344B1 (en) * 2022-09-09 2024-01-09 Tencent America LLC System, method, and computer program for cross-lingual text-to-SQL semantic parsing with representation mixup

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5313575A (en) * 1990-06-13 1994-05-17 Hewlett-Packard Company Processing method for an iconic programming system
US5610828A (en) * 1986-04-14 1997-03-11 National Instruments Corporation Graphical system for modelling a process and associated method
US5701482A (en) * 1993-09-03 1997-12-23 Hughes Aircraft Company Modular array processor architecture having a plurality of interconnected load-balanced parallel processing nodes
US6286093B1 (en) * 1996-12-10 2001-09-04 Logic Express Systems, Inc. Multi-bus programmable interconnect architecture
US20020062245A1 (en) * 2000-03-09 2002-05-23 David Niu System and method for generating real-time promotions on an electronic commerce world wide website to increase the likelihood of purchase
US20020199034A1 (en) * 1998-10-01 2002-12-26 Stephen Beckett System and method for visual application development without programming

Family Cites Families (171)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4041462A (en) * 1976-04-30 1977-08-09 International Business Machines Corporation Data processing system featuring subroutine linkage operations using hardware controlled stacks
US4905138A (en) * 1985-10-17 1990-02-27 Westinghouse Electric Corp. Meta-interpreter
US4918526A (en) * 1987-03-20 1990-04-17 Digital Equipment Corporation Apparatus and method for video signal image processing under control of a data processing system
US4870610A (en) * 1987-08-25 1989-09-26 Bell Communications Research, Inc. Method of operating a computer system to provide customed I/O information including language translation
US5105353A (en) * 1987-10-30 1992-04-14 International Business Machines Corporation Compressed LR parsing table and method of compressing LR parsing tables
ATE182014T1 (en) * 1989-09-01 1999-07-15 Amdahl Corp PROGRAMMABLE COMPUTER WITH AUTOMATIC TRANSLATION BETWEEN SOURCE AND DESTINATION CODE WITH VERSION MONITORING
CA2066724C (en) * 1989-09-01 2000-12-05 Helge Knudsen Operating system and data base
US5214785A (en) * 1989-09-27 1993-05-25 Third Point Systems, Inc. Controller with keyboard emulation capability for control of host computer operation
US5276880A (en) * 1989-12-15 1994-01-04 Siemens Corporate Research, Inc. Method for parsing and representing multi-versioned computer programs, for simultaneous and synchronous processing of the plural parses
US5787432A (en) * 1990-12-06 1998-07-28 Prime Arithmethics, Inc. Method and apparatus for the generation, manipulation and display of data structures
US5369577A (en) * 1991-02-01 1994-11-29 Wang Laboratories, Inc. Text searching system
US5430836A (en) * 1991-03-01 1995-07-04 Ast Research, Inc. Application control module for common user access interface
US5507030A (en) * 1991-03-07 1996-04-09 Digitial Equipment Corporation Successive translation, execution and interpretation of computer program having code at unknown locations due to execution transfer instructions having computed destination addresses
US5487147A (en) * 1991-09-05 1996-01-23 International Business Machines Corporation Generation of error messages and error recovery for an LL(1) parser
US5410701A (en) * 1992-01-29 1995-04-25 Devonrue Ltd. System and method for analyzing programmed equations
US6104836A (en) * 1992-02-19 2000-08-15 8×8, Inc. Computer architecture for video data processing and method thereof
US5303392A (en) * 1992-02-27 1994-04-12 Sun Microsystems, Inc. Accessing current symbol definitions in a dynamically configurable operating system
US5339406A (en) 1992-04-03 1994-08-16 Sun Microsystems, Inc. Reconstructing symbol definitions of a dynamically configurable operating system defined at the time of a system crash
US5625554A (en) * 1992-07-20 1997-04-29 Xerox Corporation Finite-state transduction of related word forms for text indexing and retrieval
CA2141221A1 (en) * 1992-09-04 1994-03-17 Jaime G. Carbonell Integrated authoring and translation system
US5375241A (en) * 1992-12-21 1994-12-20 Microsoft Corporation Method and system for dynamic-link library
US6219830B1 (en) 1993-03-23 2001-04-17 Apple Computer, Inc. Relocatable object code format and method for loading same into a computer system
US5819083A (en) * 1993-09-02 1998-10-06 International Business Machines Corporation Minimal sufficient buffer space for data redistribution in a parallel database system
US6279029B1 (en) * 1993-10-12 2001-08-21 Intel Corporation Server/client architecture and method for multicasting on a computer network
US5583761A (en) * 1993-10-13 1996-12-10 Kt International, Inc. Method for automatic displaying program presentations in different languages
US5499358A (en) * 1993-12-10 1996-03-12 Novell, Inc. Method for storing a database in extended attributes of a file system
CA2138830A1 (en) * 1994-03-03 1995-09-04 Jamie Joanne Marschner Real-time administration-translation arrangement
US5467472A (en) * 1994-04-15 1995-11-14 Microsoft Corporation Method and system for generating and maintaining property sets with unique format identifiers
US5655148A (en) * 1994-05-27 1997-08-05 Microsoft Corporation Method for automatically configuring devices including a network adapter without manual intervention and without prior configuration information
WO1995034038A1 (en) 1994-06-03 1995-12-14 Synopsys, Inc. Method and apparatus for context sensitive text displays
US5778371A (en) * 1994-09-13 1998-07-07 Kabushiki Kaisha Toshiba Code string processing system and method using intervals
US6083282A (en) 1994-10-21 2000-07-04 Microsoft Corporation Cross-project namespace compiler and method
US5850518A (en) * 1994-12-12 1998-12-15 Northrup; Charles J. Access-method-independent exchange
US6139201A (en) * 1994-12-22 2000-10-31 Caterpillar Inc. Integrated authoring and translation system
US5794050A (en) * 1995-01-04 1998-08-11 Intelligent Text Processing, Inc. Natural language understanding system
US6324558B1 (en) * 1995-02-14 2001-11-27 Scott A. Wilber Random number generator and generation method
US5768580A (en) * 1995-05-31 1998-06-16 Oracle Corporation Methods and apparatus for dynamic classification of discourse
US6061675A (en) * 1995-05-31 2000-05-09 Oracle Corporation Methods and apparatus for classifying terminology utilizing a knowledge catalog
US5694523A (en) * 1995-05-31 1997-12-02 Oracle Corporation Content processing system for discourse
US5887120A (en) * 1995-05-31 1999-03-23 Oracle Corporation Method and apparatus for determining theme for discourse
US5748975A (en) * 1995-07-06 1998-05-05 Sun Microsystems, Inc. System and method for textual editing of structurally-represented computer programs with on-the-fly typographical display
US5721939A (en) * 1995-08-03 1998-02-24 Xerox Corporation Method and apparatus for tokenizing text
US5826087A (en) * 1995-10-02 1998-10-20 Lohmann; William C. Method and apparatus for cross calling programs of different lexical scoping methodology
RU2115159C1 (en) * 1995-10-24 1998-07-10 Владимир Олегович Сафонов Method and device for checking use of record fields during compilation
US6366933B1 (en) * 1995-10-27 2002-04-02 At&T Corp. Method and apparatus for tracking and viewing changes on the web
US5797004A (en) * 1995-12-08 1998-08-18 Sun Microsystems, Inc. System and method for caching and allocating thread synchronization constructs
US5822580A (en) * 1996-01-19 1998-10-13 Object Technology Licensing Corp. Object oriented programming based global registry system, method, and article of manufacture
US6076088A (en) * 1996-02-09 2000-06-13 Paik; Woojin Information extraction system and method using concept relation concept (CRC) triples
US5974372A (en) * 1996-02-12 1999-10-26 Dst Systems, Inc. Graphical user interface (GUI) language translator
CA2175711A1 (en) * 1996-05-01 1997-11-02 Lee Richard Nackman Incremental compilation of c++ programs
US5832484A (en) * 1996-07-02 1998-11-03 Sybase, Inc. Database system with methods for parallel lock management
IL118959A (en) * 1996-07-26 1999-07-14 Ori Software Dev Ltd Database apparatus
US6044367A (en) * 1996-08-02 2000-03-28 Hewlett-Packard Company Distributed I/O store
US6085186A (en) * 1996-09-20 2000-07-04 Netbot, Inc. Method and system using information written in a wrapper description language to execute query on a network
US5961594A (en) * 1996-09-26 1999-10-05 International Business Machines Corporation Remote node maintenance and management method and system in communication networks using multiprotocol agents
US5787425A (en) * 1996-10-01 1998-07-28 International Business Machines Corporation Object-oriented data mining framework mechanism
US6055561A (en) * 1996-10-02 2000-04-25 International Business Machines Corporation Mapping of routing traffic to switching networks
US5903756A (en) * 1996-10-11 1999-05-11 Sun Microsystems, Incorporated Variable lookahead parser generator
US5916305A (en) * 1996-11-05 1999-06-29 Shomiti Systems, Inc. Pattern recognition in data communications using predictive parsers
US6065039A (en) * 1996-11-14 2000-05-16 Mitsubishi Electric Information Technology Center America, Inc. (Ita) Dynamic synchronous collaboration framework for mobile agents
US6460058B2 (en) * 1996-12-06 2002-10-01 Microsoft Corporation Object-oriented framework for hyperlink navigation
JP3008872B2 (en) * 1997-01-08 2000-02-14 日本電気株式会社 GUI system automatic operation device and operation macro execution device
US5951653A (en) * 1997-01-29 1999-09-14 Microsoft Corporation Method and system for coordinating access to objects of different thread types in a shared memory space
US5900871A (en) * 1997-03-10 1999-05-04 International Business Machines Corporation System and method for managing multiple cultural profiles in an information handling system
US6470389B1 (en) * 1997-03-14 2002-10-22 Lucent Technologies Inc. Hosting a network service on a cluster of servers using a single-address image
US6108754A (en) * 1997-04-03 2000-08-22 Sun Microsystems, Inc. Thread-local synchronization construct cache
US6138170A (en) * 1997-04-07 2000-10-24 Novell, Inc. Method and system for integrating external functions into an application environment
US5915255A (en) * 1997-04-23 1999-06-22 Sun Microsystems, Inc. Method and apparatus for referencing nodes using links
US6115782A (en) * 1997-04-23 2000-09-05 Sun Micosystems, Inc. Method and apparatus for locating nodes in a carded heap using a card marking structure and a node advance value
US6104715A (en) * 1997-04-28 2000-08-15 International Business Machines Corporation Merging of data cells in an ATM network
US6389379B1 (en) * 1997-05-02 2002-05-14 Axis Systems, Inc. Converification system and method
US5960382A (en) * 1997-07-07 1999-09-28 Lucent Technologies Inc. Translation of an initially-unknown message
US5897642A (en) * 1997-07-14 1999-04-27 Microsoft Corporation Method and system for integrating an object-based application with a version control system
WO1999005593A1 (en) * 1997-07-25 1999-02-04 British Telecommunications Public Limited Company Software system generation
US6101508A (en) * 1997-08-01 2000-08-08 Hewlett-Packard Company Clustered file management for network resources
US6003066A (en) * 1997-08-14 1999-12-14 International Business Machines Corporation System for distributing a plurality of threads associated with a process initiating by one data processing station among data processing stations
US5963742A (en) * 1997-09-08 1999-10-05 Lucent Technologies, Inc. Using speculative parsing to process complex input data
US5991539A (en) * 1997-09-08 1999-11-23 Lucent Technologies, Inc. Use of re-entrant subparsing to facilitate processing of complicated input data
DE19741475A1 (en) * 1997-09-19 1999-03-25 Siemens Ag Message translation method for in communication system
US6094650A (en) * 1997-12-15 2000-07-25 Manning & Napier Information Services Database analysis using a probabilistic ontology
US6098093A (en) * 1998-03-19 2000-08-01 International Business Machines Corp. Maintaining sessions in a clustered server environment
US6393386B1 (en) * 1998-03-26 2002-05-21 Visual Networks Technologies, Inc. Dynamic modeling of complex networks and prediction of impacts of faults therein
US6173316B1 (en) * 1998-04-08 2001-01-09 Geoworks Corporation Wireless communication device with markup language based man-machine interface
US6189004B1 (en) * 1998-05-06 2001-02-13 E. Piphany, Inc. Method and apparatus for creating a datamart and for creating a query structure for the datamart
US6161103A (en) * 1998-05-06 2000-12-12 Epiphany, Inc. Method and apparatus for creating aggregates for use in a datamart
US6092036A (en) * 1998-06-02 2000-07-18 Davox Corporation Multi-lingual data processing system and system and method for translating text used in computer software utilizing an embedded translator
US6237005B1 (en) * 1998-06-29 2001-05-22 Compaq Computer Corporation Web server mechanism for processing multiple transactions in an interpreted language execution environment
US6226630B1 (en) * 1998-07-22 2001-05-01 Compaq Computer Corporation Method and apparatus for filtering incoming information using a search engine and stored queries defining user folders
US6378126B2 (en) * 1998-09-29 2002-04-23 International Business Machines Corporation Compilation of embedded language statements in a source code program
US6327587B1 (en) * 1998-10-05 2001-12-04 Digital Archaeology, Inc. Caching optimization with disk and/or memory cache management
US6654953B1 (en) * 1998-10-09 2003-11-25 Microsoft Corporation Extending program languages with source-program attribute tags
US6564263B1 (en) * 1998-12-04 2003-05-13 International Business Machines Corporation Multimedia content description framework
US6269189B1 (en) * 1998-12-29 2001-07-31 Xerox Corporation Finding selected character strings in text and providing information relating to the selected character strings
US6671273B1 (en) * 1998-12-31 2003-12-30 Compaq Information Technologies Group L.P. Method for using outgoing TCP/IP sequence number fields to provide a desired cluster node
US6453321B1 (en) * 1999-02-11 2002-09-17 Ibm Corporation Structured cache for persistent objects
US6324581B1 (en) * 1999-03-03 2001-11-27 Emc Corporation File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems
US6748481B1 (en) * 1999-04-06 2004-06-08 Microsoft Corporation Streaming information appliance with circular buffer for receiving and selectively reading blocks of streaming information
US6446071B1 (en) * 1999-04-26 2002-09-03 International Business Machines Corporation Method and system for user-specific management of applications in a heterogeneous server environment
US6321190B1 (en) * 1999-06-28 2001-11-20 Avaya Technologies Corp. Infrastructure for developing application-independent language modules for language-independent applications
US7152228B2 (en) * 1999-07-08 2006-12-19 Science Applications International Corporation Automatically generated objects within extensible object frameworks and links to enterprise resources
US6199195B1 (en) * 1999-07-08 2001-03-06 Science Application International Corporation Automatically generated objects within extensible object frameworks and links to enterprise resources
US6311151B1 (en) * 1999-07-28 2001-10-30 International Business Machines Corporation System, program, and method for performing contextual software translations
US6275790B1 (en) * 1999-07-28 2001-08-14 International Business Machines Corporation Introspective editor system, program, and method for software translation
US6442565B1 (en) * 1999-08-13 2002-08-27 Hiddenmind Technology, Inc. System and method for transmitting data content in a computer network
US6490666B1 (en) * 1999-08-20 2002-12-03 Microsoft Corporation Buffering data in a hierarchical data storage environment
US6434568B1 (en) * 1999-08-31 2002-08-13 Accenture Llp Information services patterns in a netcentric environment
US6507833B1 (en) * 1999-09-13 2003-01-14 Oracle Corporation Method and apparatus for dynamically rendering components at run time
US6353925B1 (en) * 1999-09-22 2002-03-05 Compaq Computer Corporation System and method for lexing and parsing program annotations
US6826744B1 (en) * 1999-10-01 2004-11-30 Vertical Computer Systems, Inc. System and method for generating web sites in an arbitrary object framework
US6704737B1 (en) * 1999-10-18 2004-03-09 Fisher-Rosemount Systems, Inc. Accessing and updating a configuration database from distributed physical locations within a process control system
US6502097B1 (en) * 1999-12-23 2002-12-31 Microsoft Corporation Data structure for efficient access to variable-size data objects
US6721723B1 (en) * 1999-12-23 2004-04-13 1St Desk Systems, Inc. Streaming metatree data structure for indexing information in a data base
US6728692B1 (en) * 1999-12-23 2004-04-27 Hewlett-Packard Company Apparatus for a multi-modal ontology engine
US6654952B1 (en) * 2000-02-03 2003-11-25 Sun Microsystems, Inc. Region based optimizations using data dependence graphs
US6819339B1 (en) * 2000-02-24 2004-11-16 Eric Morgan Dowling Web browser with multilevel functions
AU2001243277A1 (en) * 2000-02-25 2001-09-03 Synquiry Technologies, Ltd. Conceptual factoring and unification of graphs representing semantic models
US6986132B1 (en) * 2000-04-28 2006-01-10 Sun Microsytems, Inc. Remote incremental program binary compatibility verification using API definitions
US6865716B1 (en) * 2000-05-05 2005-03-08 Aspect Communication Corporation Method and apparatus for dynamic localization of documents
US6862610B2 (en) * 2000-05-08 2005-03-01 Ideaflood, Inc. Method and apparatus for verifying the identity of individuals
US6591274B1 (en) * 2000-05-31 2003-07-08 Sprint Communications Company, L.P. Computer software framework and method for accessing data from one or more datastores for use by one or more computing applications
US6658652B1 (en) * 2000-06-08 2003-12-02 International Business Machines Corporation Method and system for shadow heap memory leak detection and other heap analysis in an object-oriented environment during real-time trace processing
JP2002007169A (en) * 2000-06-23 2002-01-11 Nec Corp System for measuring grammar comprehension rate
US6670969B1 (en) * 2000-06-29 2003-12-30 Curl Corporation Interface frames for threads
US7100153B1 (en) * 2000-07-06 2006-08-29 Microsoft Corporation Compiler generation of a late binding interface implementation
US6658416B1 (en) * 2000-07-10 2003-12-02 International Business Machines Corporation Apparatus and method for creating an indexed database of symbolic data for use with trace data of a computer program
US20030070159A1 (en) * 2000-08-04 2003-04-10 Intrinsic Graphics, Inc. Object decription language
US7027975B1 (en) * 2000-08-08 2006-04-11 Object Services And Consulting, Inc. Guided natural language interface system and method
US6981245B1 (en) * 2000-09-14 2005-12-27 Sun Microsystems, Inc. Populating binary compatible resource-constrained devices with content verified using API definitions
US6711672B1 (en) * 2000-09-22 2004-03-23 Vmware, Inc. Method and system for implementing subroutine calls and returns in binary translation sub-systems of computers
US6640231B1 (en) * 2000-10-06 2003-10-28 Ontology Works, Inc. Ontology for database design and application development
US6993568B1 (en) * 2000-11-01 2006-01-31 Microsoft Corporation System and method for providing language localization for server-based applications with scripts
US6748585B2 (en) 2000-11-29 2004-06-08 Microsoft Corporation Computer programming language pronouns
US7111283B2 (en) * 2000-11-29 2006-09-19 Microsoft Corporation Program history in a computer programming language
US6981031B2 (en) * 2000-12-15 2005-12-27 International Business Machines Corporation Language independent message management for multi-node application systems
US6883087B1 (en) * 2000-12-15 2005-04-19 Palm, Inc. Processing of binary data for compression
US6885985B2 (en) * 2000-12-18 2005-04-26 Xerox Corporation Terminology translation for unaligned comparable corpora using category based translation probabilities
US6678677B2 (en) * 2000-12-19 2004-01-13 Xerox Corporation Apparatus and method for information retrieval using self-appending semantic lattice
US6950793B2 (en) * 2001-01-12 2005-09-27 International Business Machines Corporation System and method for deriving natural language representation of formal belief structures
US7249018B2 (en) * 2001-01-12 2007-07-24 International Business Machines Corporation System and method for relating syntax and semantics for a conversational speech application
US6539460B2 (en) * 2001-01-19 2003-03-25 International Business Machines Corporation System and method for storing data sectors with header and trailer information in a disk cache supporting memory compression
US6964014B1 (en) * 2001-02-15 2005-11-08 Networks Associates Technology, Inc. Method and system for localizing Web pages
US20020133523A1 (en) * 2001-03-16 2002-09-19 Anthony Ambler Multilingual graphic user interface system and method
US6847974B2 (en) * 2001-03-26 2005-01-25 Us Search.Com Inc Method and apparatus for intelligent data assimilation
US6721943B2 (en) * 2001-03-30 2004-04-13 Intel Corporation Compile-time memory coalescing for dynamic arrays
US7024546B2 (en) * 2001-04-03 2006-04-04 Microsoft Corporation Automatically enabling editing languages of a software program
US20030005412A1 (en) * 2001-04-06 2003-01-02 Eanes James Thomas System for ontology-based creation of software agents from reusable components
US7210022B2 (en) * 2001-05-15 2007-04-24 Cloudshield Technologies, Inc. Apparatus and method for interconnecting a processor to co-processors using a shared memory as the communication interface
US7099885B2 (en) * 2001-05-25 2006-08-29 Unicorn Solutions Method and system for collaborative ontology modeling
US7266832B2 (en) * 2001-06-14 2007-09-04 Digeo, Inc. Advertisement swapping using an aggregator for an interactive television system
US20030004703A1 (en) * 2001-06-28 2003-01-02 Arvind Prabhakar Method and system for localizing a markup language document
US20030009323A1 (en) * 2001-07-06 2003-01-09 Max Adeli Application platform for developing mono-lingual and multi-lingual systems and generating user presentations
US6820075B2 (en) * 2001-08-13 2004-11-16 Xerox Corporation Document-centric system with auto-completion
US6732090B2 (en) * 2001-08-13 2004-05-04 Xerox Corporation Meta-document management system with user definable personalities
US6778979B2 (en) * 2001-08-13 2004-08-17 Xerox Corporation System for automatically generating queries
US7003764B2 (en) * 2001-10-12 2006-02-21 Sun Microsystems, Inc. Method and apparatus for dynamic configuration of a lexical analysis parser
US7432940B2 (en) * 2001-10-12 2008-10-07 Canon Kabushiki Kaisha Interactive animation of sprites in a video production
CA2359831A1 (en) * 2001-10-24 2003-04-24 Ibm Canada Limited-Ibm Canada Limitee Method and system for multiple level parsing
US20030210329A1 (en) * 2001-11-08 2003-11-13 Aagaard Kenneth Joseph Video system and methods for operating a video system
WO2003065179A2 (en) * 2002-02-01 2003-08-07 John Fairweather A system and method for mining data
CA2474716A1 (en) * 2002-02-01 2003-08-07 The Cleveland Clinic Foundation Adjustable stimulation device and method of using same
AU2003218413A1 (en) * 2002-03-29 2003-10-20 Agilent Technologies, Inc. Method and system for predicting multi-variable outcomes
US7155438B2 (en) * 2002-05-01 2006-12-26 Bea Systems, Inc. High availability for event forwarding
US7093023B2 (en) * 2002-05-21 2006-08-15 Washington University Methods, systems, and devices using reprogrammable hardware for high-speed processing of streaming data to find a redefinable pattern and respond thereto
US6915291B2 (en) * 2002-06-07 2005-07-05 International Business Machines Corporation Object-oriented query execution data structure
US7127520B2 (en) * 2002-06-28 2006-10-24 Streamserve Method and system for transforming input data streams
US6970969B2 (en) 2002-08-29 2005-11-29 Micron Technology, Inc. Multiple segment data object management
US7464254B2 (en) * 2003-01-09 2008-12-09 Cisco Technology, Inc. Programmable processor apparatus integrating dedicated search registers and dedicated state machine registers with associated execution hardware to support rapid application of rulesets to data
US7340724B2 (en) * 2003-08-15 2008-03-04 Laszlo Systems, Inc. Evaluating expressions in a software environment
US7624385B2 (en) * 2005-03-30 2009-11-24 Alcatel-Lucent Usa Inc. Method for handling preprocessing in source code transformation
US7512634B2 (en) * 2006-06-05 2009-03-31 Tarari, Inc. Systems and methods for processing regular expressions
US7827190B2 (en) * 2006-12-08 2010-11-02 Pandya Ashish A Complex symbol evaluation for programmable intelligent search memory

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5610828A (en) * 1986-04-14 1997-03-11 National Instruments Corporation Graphical system for modelling a process and associated method
US5313575A (en) * 1990-06-13 1994-05-17 Hewlett-Packard Company Processing method for an iconic programming system
US5701482A (en) * 1993-09-03 1997-12-23 Hughes Aircraft Company Modular array processor architecture having a plurality of interconnected load-balanced parallel processing nodes
US6286093B1 (en) * 1996-12-10 2001-09-04 Logic Express Systems, Inc. Multi-bus programmable interconnect architecture
US20020199034A1 (en) * 1998-10-01 2002-12-26 Stephen Beckett System and method for visual application development without programming
US20020062245A1 (en) * 2000-03-09 2002-05-23 David Niu System and method for generating real-time promotions on an electronic commerce world wide website to increase the likelihood of purchase

Also Published As

Publication number Publication date
AU2003214975A1 (en) 2003-09-02
US20040073913A1 (en) 2004-04-15
US7555755B2 (en) 2009-06-30
US7308449B2 (en) 2007-12-11
US7328430B2 (en) 2008-02-05
US7240330B2 (en) 2007-07-03
WO2004002044A3 (en) 2004-06-10
US20030171911A1 (en) 2003-09-11
US20030182529A1 (en) 2003-09-25
WO2004002044A2 (en) 2003-12-31
US20040024720A1 (en) 2004-02-05
US20070112714A1 (en) 2007-05-17
US7103749B2 (en) 2006-09-05
US7685083B2 (en) 2010-03-23
WO2003065177A3 (en) 2003-12-04
WO2003065173A9 (en) 2004-11-25
AU2003269798A1 (en) 2004-01-06
WO2003065213A1 (en) 2003-08-07
US20040031024A1 (en) 2004-02-12
EP1527414A2 (en) 2005-05-04
WO2003065212A1 (en) 2003-08-07
WO2003065177A2 (en) 2003-08-07
WO2003065634A3 (en) 2004-02-05
US20030187854A1 (en) 2003-10-02
US7533069B2 (en) 2009-05-12
WO2003065171A3 (en) 2004-02-05
US20030200531A1 (en) 2003-10-23
US8099722B2 (en) 2012-01-17
AU2003216161A1 (en) 2003-09-02
AU2003269798A8 (en) 2004-01-06
AU2003210795A1 (en) 2003-09-02
US7369984B2 (en) 2008-05-06
AU2003210789A1 (en) 2003-09-02
AU2003217312A1 (en) 2003-09-02
US20030172053A1 (en) 2003-09-11
WO2003065252A1 (en) 2003-08-07
WO2003065240A1 (en) 2003-08-07
WO2003065634A2 (en) 2003-08-07
US20060235811A1 (en) 2006-10-19
WO2003065179A3 (en) 2003-11-06
WO2003065175A3 (en) 2003-11-06
US20030191752A1 (en) 2003-10-09
WO2003065180A2 (en) 2003-08-07
AU2003225542A1 (en) 2003-09-02
WO2003065179A2 (en) 2003-08-07
AU2003210803A1 (en) 2003-09-02
US20080016503A1 (en) 2008-01-17
WO2003065173A2 (en) 2003-08-07
US7210130B2 (en) 2007-04-24
WO2003065175A2 (en) 2003-08-07
WO2003065180A3 (en) 2003-11-27
WO2003065173A3 (en) 2005-03-10
US20030188004A1 (en) 2003-10-02
US7143087B2 (en) 2006-11-28
US20030187633A1 (en) 2003-10-02
US7158984B2 (en) 2007-01-02

Similar Documents

Publication Publication Date Title
WO2003065171A2 (en) A system and method for managing dataflows
US7308674B2 (en) Data flow scheduling environment with formalized pin-base interface and input pin triggering by data collections
US6983357B2 (en) Hardware accelerator for an object-oriented programming language
US6330659B1 (en) Hardware accelerator for an object-oriented programming language
US9098297B2 (en) Hardware accelerator for an object-oriented programming language
US5864862A (en) System and method for creating reusable components in an object-oriented programming environment
AU691031B2 (en) System and method for providing interoperability among heterogeneous object systems
US20080133891A1 (en) Data parallelism and parallel operations in stream processing
US7669178B2 (en) System and method for interacting with computer programming languages at semantic level
WO2004042567A2 (en) Information processing systems configured and manipulated under an application framework
US20050060707A1 (en) Method for iterating through elements of a collection
Gutknecht et al. Zonnon Language Report
Dutoit et al. The Basic Object System: Supporting a spectrum from prototypes to hardened code
Thomas Extensibility and reuse of object-oriented synchronization components
EP0857330B1 (en) Method for creating reusable components in an object-oriented programming environment
Boer et al. Compositional semantics for concurrent object groups in ABS
Ashenden et al. Suave language description
Lin et al. A language adaptation architecture for reflective concurrent systems
Ali iPhone SDK 3 Programming
Kamath Reflective communications framework: An approach to rapid deployment of communications architectures in distributed systems
Stevens et al. DESIGN OF A PROTOTYPE SYSTEM BEHAVIOUR SIMULATOR FOR IDASS
Lin Adaptation of the Object-Oriented Language/Software in Adapter
UNIT et al. CS 2203 OBJECT-ORIENTED PROGRAMMING 3 0 0 3
Nordhagen Flexible Software Components and Systems
Shenoy Investigation of the use of the object-oriented paradigm in the construction of a triple store based on dynamic hashing.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP