| 10725755 |
Systems, apparatuses, and methods for a hardware and software system to automatically decompose a program to multiple parallel threads |
David J. Sager, Ruchira Sasanka, Ron Gabor, Shlomo Raikin, Joseph Nuzman +10 more |
2020-07-28 |
| 10120663 |
Inter-architecture compatability module to allow code module of one architecture to use library module of another architecture |
Niranjan Hasabnis, Jayaram Bobba |
2018-11-06 |
| 9672019 |
Systems, apparatuses, and methods for a hardware and software system to automatically decompose a program to multiple parallel threads |
David J. Sager, Ruchira Sasanka, Ron Gabor, Shlomo Raikin, Joseph Nuzman +10 more |
2017-06-06 |
| 9542191 |
Hardware profiling mechanism to enable page level automatic binary translation |
Paul Caprioli, Matthew C. Merten, Muawya M. Al-Otoom, Omar M. Shaikh, Abhay S. Kanhere +3 more |
2017-01-10 |
| 9529645 |
Methods and apparatus to manage speculative execution of object locks by diverting the speculative execution of target code |
Stephen H. Dohrmann, Mingqiu Sun, Uma Srinivasan, Ravi Rajwar, Konrad K. Lai |
2016-12-27 |
| 9417855 |
Instruction and logic to perform dynamic binary translation |
Abhay S. Kanhere, Paul Caprioli, Koichi Yamada, Suriya Madras-Subramanian |
2016-08-16 |
| 9189233 |
Systems, apparatuses, and methods for a hardware and software system to automatically decompose a program to multiple parallel threads |
Ruchira Sasanka, Abhinav Das, Jeffrey J. Cook, Jayaram Bobba, Arvind Krishnaswamy +1 more |
2015-11-17 |
| 9170789 |
Analyzing potential benefits of vectorization |
Ruchira Sasanka, Jeffrey J. Cook, Abhinav Das, Jayaram Bobba, Michael R. Greenfield |
2015-10-27 |
| 8972994 |
Method and apparatus to bypass object lock by speculative execution of generated bypass code shell based on bypass failure threshold in managed runtime environment |
Stephen H. Dohrmann, Mingqiu Sun, Uma Srinivasan, Ravi Rajwar, Konrad K. Lai |
2015-03-03 |
| 8812792 |
Technique for using memory attributes |
Quinn A. Jacobson, Anne W. Bracy, Hong Wang, John Shen, Per Hammarlund +6 more |
2014-08-19 |
| 8775153 |
Transitioning from source instruction set architecture (ISA) code to translated code in a partial emulation environment |
Sebastian Winkel, Koichi Yamada, James E. Smith |
2014-07-08 |
| 8762127 |
Transitioning from source instruction set architecture (ISA) code to translated code in a partial emulation environment |
Sebastian Winkel, Koichi Yamada, James E. Smith |
2014-06-24 |
| 8560781 |
Technique for using memory attributes |
Quinn A. Jacobson, Anne W. Bracy, Hong Wang, John Shen, Per Hammarlund +6 more |
2013-10-15 |
| 7991956 |
Providing application-level information for use in cache management |
Rameshkumar G. Illikkal, Ravishankar Iyer, Li Zhao, Donald Newell, Carl Lebsack +2 more |
2011-08-02 |
| 7991965 |
Technique for using memory attributes |
Quinn A. Jacobson, Anne W. Bracy, Hong Wang, John Shen, Per Hammarlund +6 more |
2011-08-02 |
| 7415701 |
Methods and apparatus to support mixed-mode execution within a single instruction set architecture process of a virtual machine |
Yun Wang, Miaobo Chen, Eric Lin, Chris Elford |
2008-08-19 |