1. Field of the Invention
The present disclosure relates generally to data access and analysis and, more specifically, to a system and method for evaluating programs in batch.
2. Description of the Related Art
Software applications, such as financial analysis applications, allow users to create and interact with large software data objects. Such data objects organize data relevant to the software application and provide methods that allow operations to be performed on the data. In some situations, the operations are performed on a large set of data and require high processing power as well as high bandwidth access to a database.
Typically, for the efficient processing of such operations, the bulk of the processing occurs on a server that is external to the computing device that executes the software application. In operation, the software application transmits calls associated with the operations to be performed on the data, and the calls are processed on the server. The results of the processing are then transmitted back to the software application for presentation to the user.
One drawback to such an implementation is that the server receives and processes one call per operation to be performed. In situations where operations are performed on an extremely large set of data, serving a large amount of calls can slow down the server and, in some cases, crash the server. Such a scenario is extremely undesirable because the server is extremely slow and in some cases entirely unusable, thereby affecting the overall user experience.
As the foregoing illustrates, what is needed in the art is a mechanism for efficiently managing and processing a large volume of calls to be processed on a server.
One embodiment of the invention is computer-implemented method for evaluating a plurality of expressions in batch. The method includes analyzing a first expression to be evaluated within a call stack associated with a first instruction of a software routine, wherein the first instruction specifies the first expression, determining that the first expression should be batch evaluated with a second expression to be evaluated within a different call stack, transmitting a batch processing request to an application server for batch evaluating the first expression and the second expression, receiving a different value for each of the first expression and the second expression that is generated when the batch processing request is processed by the application server, and populating the call stack with the value for the first expression.
Advantageously, because a single batch processing request is transmitted to the application server for a group of similar expressions, the number of processing requests received by the application server is reduced. As a result, the application server is not burdened with a large amount of requests at any given time. Therefore, the overall processing efficiency of the application server is increased and the overall processing latency of the application server is reduced.
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
The application 102 is a software program that allows a user to create, analyze and interact with workflows having one or more documents. A document is typically composed of several data objects, each having a particular type and function. The data objects that could make up a document are described in greater detail below. A user, via a programming interface, can typically write program routines that interact with the data objects to generate the results or analysis needed. Again, some examples of such instructions are described below.
The service logic 104 is an infrastructure layer that, among other things, allows the application 102 to communicate with the application server 106. In one embodiment, the service logic 104 includes a messaging service (not shown) that allows the application 102 and the application server 106 to communicate asynchronously via messages. The service logic 104 includes a stack evaluator 118 and a batching module 120. The stack evaluator 118 is an infrastructure module that manages the stack-based evaluation of program routines associated with the application 102. Each program routine is associated with a call stack that includes multiple frames, each frame storing information about a particular portion of the program routine. The batching module 120 allows for the batch processing on the application server 106 of program routines being evaluated within the stack evaluator 118. The functions of the stack evaluator 118 and the batching module 120 is described in greater detail below in conjunction with
The application server 106 includes logical elements such as input receiving logic 110, an object model 112, evaluation logic 114 and data store access logic 116. The application server 106 may be implemented as a special-purpose computer system having the logical elements shown in
The input receiving logic 110 receives inputs from different applications executing within the system 100, such as the application 102, via the service logic 104. Inputs include, but are not limited to, processing requests, data access/storage requests and expression evaluation requests. The input receiving logic 110 transmits requests received from the different applications to logical elements within the application server 106 that are configured to process those requests.
The object model 112 is a model that specifies a universe of data objects, relationships between the data objects, higher-order data objects generated based on one or more zero-order data objects in the universe, higher-order data objects generated based on other higher-order data objects, and auxiliary entities related to the universe of data objects. The data objects may be created by users via data object creation mechanisms exposed in different applications, such as the application 102. In one embodiment, the object model 112 includes only references to the data objects and data related to those data objects is stored within the data store 108. Persons skilled in the art would understand that any other data objects can be included in the object model 112.
The evaluation logic 114 receives expression evaluation requests from applications, such as the application 102, via the input receiving logic and evaluates the expressions specified in those requests. An expression typically includes a reference to one or more data objects included in the object model 112 and specifies one or more operations to be performed on those data objects. The evaluation logic 114, when processing a particular expression, may create, modify, delete and store data objects that are associated with the universe of data objects included in the object model 112. In addition, the evaluation logic 112 transmits the results of processing the particular expression to the application that transmitted the expression evaluation request.
In an embodiment, application server 106 comprises data store access logic 116. Data store access logic 116 may comprise a set of program instructions which, when executed by one or more processors, are operable to access and retrieve data from data store 108. For example, data store access logic 116 may be a database client or an Open Database Connectivity (ODBC) client that supports calls to a database server that manages data store 108. Data store 108 may be any type of structured storage for storing data including, but not limited to, relational or object-oriented databases, data warehouses, directories, data files, and any other structured data storage.
The stack evaluator 118 generates a stack 202 corresponding to each program subroutine (referred to herein as a “subroutine”) associated with the application 102. Typically, a subroutine includes multiple instructions, where each instruction includes one or more expressions to be evaluated. As discussed above, an expression may include an argument, a parameter and/or a metric, as described above. When evaluating a particular instruction, the stack evaluator 118 generates a different frame for each expression within that instruction. For example, an array frame is generated for each argument of an instruction and a call frame is generated for performing a specified operation on the arguments that were evaluated in the array frame(s).
The frames portion 206 includes multiple frames 204, where each frame 204 corresponds to a particular evaluation iteration of the subroutine corresponding to the stack 202. When a particular frame is ready for evaluation, the stack 202 transitions to an “evaluation state.” During evaluation, the expressions within the current frame are first extracted and pushed into the expression array 210, such as exp 214. The value of the expressions are then evaluated and pushed into the value array 208. If an expression being evaluated is nested, the evaluation of the expression in the current frame 204 generates one or more new frames 204 that are evaluated before evaluating the current frame. Once the evaluation of each frame in the stack 202 is completed, the stack 202 transitions to a “completed state.”
The batching module 120 monitors the execution of program subroutines within the stack evaluator 118 to identify program subroutines that can be processed within the application server 106 in batch. More specifically, for each stack 202, the inspection engine 302 analyzes a current expression within a frame 204 of the stack 202 to determine whether the evaluation of the expression should be evaluated in batch with other similar expressions.
To determine whether a particular expression should be evaluated in batch with other similar expressions, the inspection engine 302 first determines the type of the expression. An expression may be an economic index, an instrument, a metric, an input object, an output object, a parameter, a time series, a higher-order-object, or any higher-order object in the object model. Based on the type of expression, the inspection engine 302 then determines whether the type of the expression falls within a pre-determined category of expressions that should be processed in batch with other expressions of the same type or a similar type. For example, an expression that includes a metric for which the evaluation involves a database access or a model access should be processed in batch with other expressions that include metrics for which the evaluation involves database accesses or model accesses.
As another example, consider the following program instruction: return this.close+this.open, where “this” refers to a time series. There are multiple expressions within the program instruction, such as “this.close,” “+,” and “this.open.” In one scenario, the program instruction may be evaluated multiple times, each evaluation generating a different stack 202. In such a scenario, the inspection engine 302 may identify the expressions “this.close” and “this.open” as expressions that should be evaluated in batch with similar expressions. Therefore, for each stack 202, the corresponding “this.close” expression is evaluated in batch with the “this.close” expressions in the remaining stacks 202. Similarly, for each stack 202, the corresponding “this.open” expression is evaluated in batch with the “this.open” expressions in the remaining stacks 202.
For a particular stack 202, once the inspection engine 302 determines that the current expression should be evaluated in batch with other similar expressions, the blocking engine 304 blocks the processing of the current expression and the stack 202, in general. At this instant, the stack 202 transitions to a “blocked state.” Therefore, at any given point, a stack 202 is either in an evaluation state, a blocked state or a completed state. When all the stacks 202 are either in a blocked state or a completed state, the blocking engine 304 prepares the current expressions in each of the blocked stacks 202 (referred to herein as the “blocked expressions”) for evaluation on the application server 106 in batch. The blocking engine 304 divides the blocked expressions into partitions, where blocked expressions in a particular partition are each associated with at least one similar characteristic. For example, each blocked expression in a particular partition may need a database call to be executed by the application server 106.
Once the blocked expressions are divided into partitions, the blocking engine 304 dispatches, per partition, a single call to the application server 106 for evaluating all of the expressions in that partition. The application server 106 evaluates the expression in a manner described above in conjunction with
The inspection engine 302 continues to inspect the stacks 202 to identify expressions that can be evaluated in batch. In turn, the blocking engine 304 continues to block stacks 202 and dispatch calls for evaluating similar expressions in batch until each of the stacks 202 is in a completed state. In such a manner, similar expressions from different stacks 202 are processed in batch within the application server 106, thus increasing the efficiency of the overall system.
The system memory 402 includes the application 102 previously described herein. The system memory 402 is a memory space, usually a random access memory (RAM), that temporarily stores software programs running within the system 400 at any given time. The CPU 406 executes a sequence of stored instructions associated with and/or transmitted from the various elements in the computer system 400. The external memory 404 is a storage device, e.g. a hard disk, for storing data associated with the application 102. The input device 410 is an end-user controlled input device, e.g. a mouse or keyboard, that allows a user to manipulate various aspects of the application 102. The display device 412 may be a cathode-ray tube (CRT), a liquid crystal display (LCD) or any other type of display device.
The method 500 begins at step 501, where the stack evaluator 118 generates a stack 202 corresponding to a program subroutine associated with the application 102 that is being evaluated. At step 502, the stack evaluator 118 generates a call frame associated with a particular program instruction included in the program subroutine. As discussed above, each program instruction within a program subroutine includes one or more expressions to be evaluated. An expression may be an argument, a parameter and/or a metric, as described above. Therefore, the call frame associated with the particular program instruction includes the one or more expressions to be evaluated.
At step 504, the stack evaluator 118 generates a different child frame for evaluating each expression within that instruction. For example, an array frame is generated for each argument of an instruction. At step 506, the stack evaluator 118 transitions the stack 202 to an evaluation state. At step 508, the stack evaluator 118 begins the evaluation of an expression included in a next child frame to be evaluated (referred to herein as the “current frame”). An expression is evaluated either within the stack evaluator 118 itself or needs to be processed within the application server 106 as described above in conjunction with
At step 510, the stack evaluator 118 receives a request from the inspection engine 302 to inspect the current frame. As described above, each time a new frame is being evaluated, the inspection engine analyzes a current expression that is to be evaluated within the frame to determine whether the evaluation of the expression should be executed in batch with other similar expressions. The process of inspection and batch execution is described in detail with respect to
At step 512, the stack evaluator 118 determines whether the stack 202 is in a blocked state. As discussed above and described in greater detail with respect to
At step 518, the stack evaluator 118 determines whether any child frames were generated at step 504 are still not evaluated. If so, then the method proceeds to step 508 previously described herein. If the stack evaluator 118 determines that all the child frames were generated at step 504 have been evaluated, then the method 500 proceeds to step 520. At step 520, the stack evaluator 118 determines whether the call frame that was generated at step 502 has been evaluated.
If, at step 520, the stack evaluator 118 determines that the call frame that was generated at step 502 has not been evaluated, then the method 500 proceeds to step 522. At step 522, the stack evaluator 118 begins the evaluation of the call frame based on the expressions that were evaluated via the child frames. The method then proceeds to step 510 previously described herein.
If, however, at step 520, the stack evaluator 118 determines that the call frame that was generated at step 502 has already been evaluated, then the method 500 proceeds to step 524. At step 524, the stack evaluator 118 transitions the state of the stack 202 to the completed state. The method 500 then ends.
As discussed above, the application 102 is associated with one or more program subroutines and each program subroutine includes multiple program instructions. Persons skilled in the art would recognize that the stack evaluator 118 executes the method steps described with respect to
The method 600 begins at step 602, where the inspection engine 302, for each stack 202, inspects an expression within the stack 202 that is to be evaluated. At step 604, the inspection engine 302, based on the inspection, identifies one or more expressions included in the unblocked stacks that should be batch processed. As previously described, the inspections engine 302 identifies such expressions based on a type of the expression, the number of inputs specified in the expression, the type of operation to be performed, etc.
At step 606, the blocking engine 304 blocks the processing of the expressions identified at step 604 and the stacks 202 that include those expressions. In one embodiment, the blocking engine 304 transitions the state of each of the stacks 202 to a blocked state. At step 608 the blocking engine 304 determines whether all the stacks are in a blocked or completed state. If, at step 608 at least one stack is not in a blocked or completed state, then the method 600 returns to step 602. If, however, at step 608 all the stacks are in a blocked or completed state, then the method 600 proceeds to step 610.
At step 610, the blocking engine 304 divides the expressions included in the blocked stacks into partitions, where expressions in a particular partition are each associated with at least one similar characteristic. For example, each blocked expression in a particular partition may be a database call to be executed by the application server 106. At step 612, once the blocked expressions are divided into partitions, the blocking engine 304 dispatches, for each partition, a single call to the application server 106 for evaluating each of the expressions in that partition in batch. The application server 106 evaluates the expression in a manner described above in conjunction with
At step 614, the unblocking engine 306 receives, for each partition, the results for each expression in the partition. At step 616, for each received result, the unblocking engine 306 updates the stack 202 corresponding to the expression for which the result was generated to store the result. At step 618, the unblocking engine 306 unblocks each of the updated stacks 202, which then continue to be processed.
Advantageously, because a single batch processing request is transmitted to the application server for a group of similar expressions, the number of processing requests received by the application server is reduced. As a result, the application server is not burdened with a large amount of requests at any given time. Therefore, the overall processing efficiency of the application server is increased and the overall processing latency of the application server is reduced.
One embodiment of the invention may be implemented as a program product for use with a computer system. The program(s) of the program product define functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, flash memory, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.
Another embodiment of the invention may be implemented as a program product deployed for use over a network. In such an embodiment, the program product may be accessed via a web browser.
The invention has been described above with reference to specific embodiments. Persons skilled in the art, however, will understand that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The foregoing description and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5418950 | Li et al. | May 1995 | A |
| 5428737 | Li et al. | Jun 1995 | A |
| 5428776 | Rothfield | Jun 1995 | A |
| 5542089 | Lindsay et al. | Jul 1996 | A |
| 5608899 | Li et al. | Mar 1997 | A |
| 5613105 | Xbikowski et al. | Mar 1997 | A |
| 5701456 | Jacopi et al. | Dec 1997 | A |
| 5724575 | Hoover et al. | Mar 1998 | A |
| 5794228 | French et al. | Aug 1998 | A |
| 5794229 | French et al. | Aug 1998 | A |
| 5857329 | Bingham | Jan 1999 | A |
| 5911138 | Li et al. | Jun 1999 | A |
| 5918225 | White et al. | Jun 1999 | A |
| 6208985 | Krehel | Mar 2001 | B1 |
| 6236994 | Swartz et al. | May 2001 | B1 |
| 6289334 | Reiner et al. | Sep 2001 | B1 |
| 6311181 | Lee et al. | Oct 2001 | B1 |
| 6321274 | Shakib et al. | Nov 2001 | B1 |
| 6851108 | Syme et al. | Feb 2005 | B1 |
| 6857120 | Arnold et al. | Feb 2005 | B1 |
| 6877137 | Rivette et al. | Apr 2005 | B1 |
| 6976024 | Chavez et al. | Dec 2005 | B1 |
| 7085890 | Kashyap | Aug 2006 | B2 |
| 7406592 | Polyudov | Jul 2008 | B1 |
| 7519589 | Charnock et al. | Apr 2009 | B2 |
| 7546353 | Hesselink et al. | Jun 2009 | B2 |
| 7610290 | Kruy et al. | Oct 2009 | B2 |
| 7627489 | Schaeffer et al. | Dec 2009 | B2 |
| 7783679 | Bley | Aug 2010 | B2 |
| 7853573 | Warner et al. | Dec 2010 | B2 |
| 7877421 | Berger et al. | Jan 2011 | B2 |
| 7908521 | Sridharan et al. | Mar 2011 | B2 |
| 7979424 | Dettinger et al. | Jul 2011 | B2 |
| 8073857 | Sreekanth | Dec 2011 | B2 |
| 8103962 | Embley et al. | Jan 2012 | B2 |
| 8417715 | Bruckhaus et al. | Apr 2013 | B1 |
| 8429194 | Aymeloglu et al. | Apr 2013 | B2 |
| 8433702 | Carrino et al. | Apr 2013 | B1 |
| 8499287 | Shafi et al. | Jul 2013 | B2 |
| 8560494 | Downing | Oct 2013 | B1 |
| 8639552 | Chen et al. | Jan 2014 | B1 |
| 8909597 | Aymeloglu et al. | Dec 2014 | B2 |
| 8924429 | Fisher et al. | Dec 2014 | B1 |
| 8935201 | Fisher et al. | Jan 2015 | B1 |
| 20020184111 | Swanson | Dec 2002 | A1 |
| 20030004770 | Miller et al. | Jan 2003 | A1 |
| 20030023620 | Trotta | Jan 2003 | A1 |
| 20030105833 | Daniels et al. | Jun 2003 | A1 |
| 20040088177 | Travis et al. | May 2004 | A1 |
| 20040098731 | Demsey et al. | May 2004 | A1 |
| 20040103088 | Cragun et al. | May 2004 | A1 |
| 20040126840 | Cheng et al. | Jul 2004 | A1 |
| 20040139212 | Mukherjee et al. | Jul 2004 | A1 |
| 20050004911 | Goldberg et al. | Jan 2005 | A1 |
| 20050021397 | Cui et al. | Jan 2005 | A1 |
| 20050120080 | Weinreb et al. | Jun 2005 | A1 |
| 20050183005 | Denoue et al. | Aug 2005 | A1 |
| 20050226473 | Ramesh | Oct 2005 | A1 |
| 20050278286 | Djugash et al. | Dec 2005 | A1 |
| 20060004740 | Dettinger et al. | Jan 2006 | A1 |
| 20060070046 | Balakrishnan et al. | Mar 2006 | A1 |
| 20060074967 | Shaburov | Apr 2006 | A1 |
| 20060080616 | Vogel et al. | Apr 2006 | A1 |
| 20060116991 | Calderwood | Jun 2006 | A1 |
| 20060142949 | Helt | Jun 2006 | A1 |
| 20060209085 | Wong et al. | Sep 2006 | A1 |
| 20060271884 | Hurst | Nov 2006 | A1 |
| 20060288046 | Gupta et al. | Dec 2006 | A1 |
| 20070005582 | Navratil et al. | Jan 2007 | A1 |
| 20070027851 | Kruy et al. | Feb 2007 | A1 |
| 20070094248 | McVeigh et al. | Apr 2007 | A1 |
| 20070113164 | Hansen et al. | May 2007 | A1 |
| 20070168336 | Ransil et al. | Jul 2007 | A1 |
| 20070178501 | Rabinowitz et al. | Aug 2007 | A1 |
| 20070192281 | Cradick et al. | Aug 2007 | A1 |
| 20070260582 | Liang | Nov 2007 | A1 |
| 20080126344 | Hoffman et al. | May 2008 | A1 |
| 20080126951 | Sood et al. | May 2008 | A1 |
| 20080155440 | Trevor et al. | Jun 2008 | A1 |
| 20080201313 | Dettinger et al. | Aug 2008 | A1 |
| 20080215543 | Huang et al. | Sep 2008 | A1 |
| 20080267386 | Cooper | Oct 2008 | A1 |
| 20090006150 | Prigge et al. | Jan 2009 | A1 |
| 20090007056 | Prigge et al. | Jan 2009 | A1 |
| 20090043762 | Shiverick et al. | Feb 2009 | A1 |
| 20090055487 | Moraes et al. | Feb 2009 | A1 |
| 20090083275 | Jacob et al. | Mar 2009 | A1 |
| 20090094217 | Dettinger et al. | Apr 2009 | A1 |
| 20090144747 | Baker | Jun 2009 | A1 |
| 20090161147 | Klave | Jun 2009 | A1 |
| 20090172674 | Bobak et al. | Jul 2009 | A1 |
| 20090187556 | Ross et al. | Jul 2009 | A1 |
| 20090193012 | Williams | Jul 2009 | A1 |
| 20090248721 | Burton et al. | Oct 2009 | A1 |
| 20090282068 | Shockro et al. | Nov 2009 | A1 |
| 20090299830 | West et al. | Dec 2009 | A1 |
| 20090319996 | Shafi et al. | Dec 2009 | A1 |
| 20100011282 | Dollard et al. | Jan 2010 | A1 |
| 20100073315 | Lee et al. | Mar 2010 | A1 |
| 20100082671 | Li et al. | Apr 2010 | A1 |
| 20100145902 | Boyan et al. | Jun 2010 | A1 |
| 20100161646 | Ceballos et al. | Jun 2010 | A1 |
| 20100169376 | Chu | Jul 2010 | A1 |
| 20100169405 | Zhang | Jul 2010 | A1 |
| 20100199167 | Uematsu et al. | Aug 2010 | A1 |
| 20100313119 | Baldwin | Dec 2010 | A1 |
| 20110035396 | Merz et al. | Feb 2011 | A1 |
| 20110041084 | Karam | Feb 2011 | A1 |
| 20110066497 | Gopinath et al. | Mar 2011 | A1 |
| 20110074811 | Hanson et al. | Mar 2011 | A1 |
| 20110093490 | Schindlauer et al. | Apr 2011 | A1 |
| 20110131547 | Elaasar | Jun 2011 | A1 |
| 20110208822 | Rathod | Aug 2011 | A1 |
| 20110252282 | Meek et al. | Oct 2011 | A1 |
| 20110258216 | Supakkul et al. | Oct 2011 | A1 |
| 20110270871 | He et al. | Nov 2011 | A1 |
| 20120078595 | Balandin et al. | Mar 2012 | A1 |
| 20120102022 | Miranker et al. | Apr 2012 | A1 |
| 20120173381 | Smith | Jul 2012 | A1 |
| 20120174057 | Narendra et al. | Jul 2012 | A1 |
| 20120188252 | Law | Jul 2012 | A1 |
| 20120284719 | Phan et al. | Nov 2012 | A1 |
| 20130054551 | Lange | Feb 2013 | A1 |
| 20130096968 | Van Pelt et al. | Apr 2013 | A1 |
| 20130198624 | Aymeloglu et al. | Aug 2013 | A1 |
| 20130226944 | Baid et al. | Aug 2013 | A1 |
| 20130232220 | Sampson | Sep 2013 | A1 |
| 20140012886 | Downing et al. | Jan 2014 | A1 |
| 20140074888 | Potter et al. | Mar 2014 | A1 |
| 20140108074 | Miller et al. | Apr 2014 | A1 |
| 20140115589 | Marinelli, III et al. | Apr 2014 | A1 |
| 20140115610 | Marinelli et al. | Apr 2014 | A1 |
| Number | Date | Country |
|---|---|---|
| 2828264 | Apr 2014 | CA |
| 2829266 | Apr 2014 | CA |
| 102014103482 | Sep 2014 | DE |
| 1647908 | Apr 2006 | EP |
| 2634745 | Sep 2013 | EP |
| 2743839 | Jun 2014 | EP |
| 2778986 | Sep 2014 | EP |
| 2366498 | Mar 2002 | GB |
| 2508503 | Jun 2014 | GB |
| 2508293 | Apr 2015 | GB |
| 622485 | Mar 2015 | NZ |
| 616212 | May 2015 | NZ |
| WO 0034895 | Jun 2000 | WO |
| WO 2010030917 | Mar 2010 | WO |
| Entry |
|---|
| New Zealand Intellectual Property Office, Examination Report in application No. P089467NZ:RM, dated May 7, 2014, 1 page. |
| Intellectual Property Office of London, “Examination Report with Search Report”, in application No. GB1318667.1, dated Mar. 28, 2014, 8 pages. |
| Intellectual Property Office of London, “Examination Report with Search Report” in application No. GB1318666.3, dated Mar. 24, 2013. |
| Current Claims in application No. P089467NZ:RM, dated May 2014, 4 pages. |
| Current Claims in application No. GB1318667.1, dated Mar. 2014, 3 pages. |
| Current Claims in application No. Gb1318666.3 dated Mar. 2014, 3 pages. |
| Bogle, Philip, “Reducing Cross-Domain Call Overhead Using Beatched Futures”, dated May 1994, 96 pages. |
| New Zealand Intellectual Property Office, First Examination Report in application 616212, dated Oct. 9, 2013, 2 pages. |
| Anonymous, current claims of application 616212, dated Oct. 2013, 14 pages. |
| New Zealand Intellectual Property Office, First Examination Report in application 616299, dated Oct. 9, 2013, 1 page. |
| Anonymous, current claims in application 616299, dated Oct. 2013, 4 pages. |
| “A Quick Guide to UniProtKB Swiss-Prot & TrEMBL,” Sep. 2011, pp. 2. |
| “A Tour of Pinboard,” <http://pinboard.in/tour> as printed May 15, 2014 in 6 pages. |
| Bae et al., “Partitioning Algorithms for the Computation of Average Iceberg Queries,” DaWaK 2000, LNCS 1874, pp. 276-286. |
| Canese et al., “Chapter 2: PubMed: The Bibliographic Database,” The NCBI Handbook, Oct. 2002, pp. 1-10. |
| Chazelle et al., “The Bloomier Filter: An Efficient Data Structure for Static Support Lookup Tables,” SODA '04 Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004, pp. 30-39. |
| Delcher et al., “Identifying Bacterial Genes and Endosymbiont DNA with Glimmer,” BioInformatics, vol. 23, No. 6, 2007, pp. 673-679. |
| Delicious, <http://delicious.com/> as printed May 15, 2014 in 1 page. |
| Donjerkovic et al., “Probabilistic Optimization of Top N Queries,” Proceedings of the 25th VLDB Conference, Edinburgh, Scotland, 1999, pp. 411-422. |
| Fang et al., “Computing Iceberg Queries Efficiently,” Proceedings of the 24th VLDB Conference New York, 1998, pp. 299-310. |
| “Frequently Asked Questions about Office Binder 97,” http://web.archive.org/web/20100210112922/http://support.microsoft.com/kb/843147 printed Dec. 18, 2006 in 5 pages. |
| Han et al., “Efficient Computation of Iceberg Cubes with Complex Measures,” ACM Sigmod, May 21-24, 2001, pp. 1-12. |
| Ivanova et al., “An Architecture for Recycling Intermediates in a Column-Store,” Proceedings of the 35th Sigmod International Conference on Management of Data, Sigmod '09, Jun. 29, 2009, p. 309. |
| Kahan et al., “Annotea: an Open RDF Infastructure for Shared Web Annotations”, Computer Networks, Elsevier Science Publishers B.V., vol. 39, No. 5, dated Aug. 5, 2002, pp. 589-608. |
| Karp et al., “A Simple Algorithm for Finding Frequent Elements in Streams and Bags,” ACM Transactions on Database Systems, vol. 28, No. 1, Mar. 2003, pp. 51-55. |
| Kitts, Paul, “Chapter 14: Genome Assembly and Annotation Process,” The NCBI Handbook, Oct. 2002, pp. 1-21. |
| Leela et al., “On Incorporating Iceberg Queries in Query Processors,” Technical Report, TR-2002-01, Database Systems for Advanced Applications Lecture Notes in Computer Science, 2004, vol. 2973. |
| Liu et al., “Methods for Mining Frequent Items in Data Streams: An Overview,” Knowledge and Information Systems, vol. 26, No. 1, Jan. 2011, pp. 1-30. |
| Madden, Tom, “Chapter 16: The BLAST Sequence Analysis Tool,” The NCBI Handbook, Oct. 2002, pp. 1-15. |
| Mendes et al., “TcruziKB: Enabling Complex Queries for Genomic Data Exploration,” IEEE International Conference on Semantic Computing, Aug. 2008, pp. 432-439. |
| Mizrachi, Ilene, “Chapter 1: GenBank: The Nuckeotide Sequence Database,” The NCBI Handbook, Oct. 2002, pp. 1-14. |
| Russell et al., “NITELIGHT: A Graphical Tool for Semantic Query Construction,” 2008, pp. 10. |
| Sigrist, et al., “PROSITE, a Protein Domain Database for Functional Characterization and Annotation,” Nucleic Acids Research, 2010, vol. 38, pp. D161-D166. |
| Sirotkin et al., “Chapter 13: The Processing of Biological Sequence Data at NCBI,” The NCBI Handbook, Oct. 2002, pp. 1-11. |
| Smart et al., “A Visual Approach to Semantic Query Design Using a Web-Based Graphical Query Designer,” 16th International Conference on Knowledge Engineering and Knowledge Management (EKAW 2008), Acitrezza, Catania, Italy, Sep. 29-Oct. 3, 2008, pp. 16. |
| “The FASTA Program Package,” fasta-36.3.4, Mar. 25, 2011, pp. 29. |
| Notice of Acceptance for New Zealand Patent Application No. 622485 dated Nov. 24, 2014. |
| Official Communication for European Patent Application No. 14159175.0 dated Jul. 17, 2014. |
| Official Communication for European Patent Application No. 14159629.6 dated Jul. 31, 2014. |
| Official Communication for European Patent Application No. 14159629.6 dated Sep. 22, 2014. |
| Official Communication for New Zealand Patent Application No. 622414 dated Mar. 24, 2014. |
| Official Communication for New Zealand Patent Application No. 622484 dated Apr. 2, 2014. |
| Official Communication for New Zealand Patent Application No. 622485 dated Nov. 21, 2014. |
| Bogle, Philip, “Reducing Cross Domain Call Overhead Using Batched Futures”, Massachusetts Institute of Technology, dated May 1994, pp. 59-69. |
| Jacques, M., “An extensible math expression parser with plug-ins,” CODE PROJECT, Mar. 13, 2008. Retrieved on Jan. 30, 2015 from the internet: <http://www.codeproject.com/Articles/7335/An-extensible-math-expression-parser-with-plug-ins>. |
| Notice of Acceptance for New Zealand Patent Application No. 616212 dated Jan. 23, 2015. |
| Official Communication for Great Britain Patent Application No. 1404574.4 dated Dec. 18, 2014. |
| Official Communication for New Zealand Patent Application No. 616299 dated Jan. 26, 2015. |
| Official Communication for Canadian Patent Application No. 2807899 dated Oct. 24, 2014. |
| Official Communication for Australian Patent Application No. 2013237658 dated Feb. 2, 2015. |
| Official Communication for Australian Patent Application No. 2013237710 dated Jan. 16, 2015. |
| Official Communication for Australian Patent Application No. 2014201580 dated Feb. 27, 2015. |
| Claims for Australian Patent Application No. 2013237658 dated Feb. 2015, 4 pages. |
| Claims for Australian Patent Application No. 2013237710 dated Jan. 2015, 4 pages. |
| Claims for New Zealand Patent Application No. P090010NZ:RMN dated Jan. 2015, 4 pages. |
| U.S. Appl. No. 13/827,627, filed Mar. 14, 2013, Office Action, Mar. 2, 2015. |
| U.S. Appl. No. 13/608,864, filed Sep. 10, 2012, Office Action, Mar. 17, 2015. |
| U.S. Appl. No. 13/831,791, filed Mar. 15, 2013, Office Action, Mar. 4, 2015. |
| U.S. Appl. No. 14/304,741, filed Jun. 13, 2014, Final Office Action, Mar. 3, 2015. |
| U.S. Appl. No. 14/304,741, filed Jun. 13, 2014, Office Action, Aug. 6, 2014. |
| U.S. Appl. No. 14/304,741, filed Jun. 13, 2014, Notice of Allowance, Apr. 7, 2015. |
| Ballesteros et al., “Batching: A Design Pattern for Efficient and Flexible Client/Server Interaction,” Transactions on Pattern Languages of Programming, Springer Berlin Heildeberg, 2009, pp. 48-66. |
| Bogle et al., “Reducing Cross-Domain Call Overhead Using Batched Futures,” SIGPLAN No. 29, 10 (Oct. 1994) pp. 341-54. |
| Stamos et al., “Remote Evaluation,” Journal ACM Transactions on Programming Languages and Systems (TOPLAS) vol. 12, Issue 4, Oct. 1990, pp. 537-564. |
| Wikipedia, “Machine Code” p. 1-5, printed Aug. 11, 2014. |
| Notice of Acceptance for New Zealand Patent Application No. 616299 dated Apr. 7, 2015. |
| Official Communication for German Patent Application No. 10 2013 221 057.4 dated Mar. 23, 2015. |
| Official Communication for German Patent Application No. 10 2013 221 052.3 dated Mar. 24, 2015. |
| Official Communication for Canadian Patent Application No. 2829266 dated Apr. 28, 2015. |
| Official Communication for Canadian Patent Application No. 2828264 dated Apr. 28, 2015. |
| Claims in Canadian Patent Application No. 2829266 dated Apr. 2015, 4 pages. |
| Number | Date | Country | |
|---|---|---|---|
| 20140115610 A1 | Apr 2014 | US |