throbber
Unified Patents Inc. v. Vilox Technologies LLC
`Ex. 1005 / Page 1 of 3
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Copyright © 1994 by International Business Machines Corporation. All rights
`reserved.Printed in the United States of America. Except as permitted under
`the United States Copyright Act of 1976, no part ofthis publication may be
`reproduced or distributed in any form or by any means, orstored in a data
`base or retrieval system, without the prior written permisssion of the pub-
`lisher.
`
`67890 DOC/DOC 9987
`
`ISBN 0-07-031488-8 (HC)
`ISBN 0-07-031489-6 (PBK)
`
`The sponsoring editor for this book was Daniel A. Gonneau and the
`production supervisor was Thomas G. Kowalczyk.
`
`Printed and bound by R. R. Donnelley & Sons Company.
`
`Tenth Edition (August 1993)
`This is a major revision of the 1BM Dictionary of Computing, SC20-1699-8,
`which is made obsolete by this edition. Changes are madeperiodically to the
`information provided herein.
`It is possible that this material may contain reference to, or information about,
`IBM products (machines and programs), programming, or services that are
`not announcedin your country. Such references or information must not be
`construed to mean that IBM intends to announce such IBM products, pro-
`gramming,or services in your country. Comments maybe addressed to IBM
`Corporation, Department E37/656, P. O. Box 12195, Research Triangle Park,
`NC 27709.
`
`International Edition
`
`Copyright © 1994 by International Business Machines Corporation. Exclusive
`rights by McGraw-Hill, Inc. for manufacture and export. This book cannot be
`re-exported from the countryto whichit is consigned by McGraw-Hill. The
`International Edition is not available in North America.
`
`Whenorderingthis title, use ISBN 0-07-113383-6.
`
`This bookis printed on acid-free paper.
`
`
`
`
`
`Limitation of Liability
`While the Editor and Publisher of this book have made reasonable efforts to
`ensure the accuracyandtimeliness of the information contained herein,nei-
`ther the Editor nor the Publisher shall have anyliability with respect to loss or
`damage caused or alleged to be caused by reliance on any information con-
`tained herein.
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1010 / Page 2 of 3
`
`Ex. 1010 / Page 2 of 3
`
`

`

`taining to the use of 24-bits per pixel direct red, green,
`blue RGB,
`in which there are 8 bits (256 levels) of
`red, 8 bits (256 levels) of green, and 8 bits (256
`levels) of blue, for a total of 256*256*256 or 16 777
`216 different combinations of red, green, and blue
`intensities.
`The number of different colored pixels
`that can then be simultaneously displayed is only
`limited by the number of pixels displayable from the
`frame buffer.
`(3) See also background color, direct
`color, pseudocolor.
`
`true complement Deprecated term for radix comple-
`ment.
`
`true run list Synonym for dispatch list.
`
`truncate (1) To terminate a computational process in
`accordance with some rule;
`for example,
`to end the
`evaluation of a powerseriesat a specified term. (A)
`(2) To remove the beginning or ending elements of a
`string.
`(3) To drop data that cannot be printed or dis-
`played in the line width specified or available. Con-
`trast with fold (3).
`(4) To shorten a field or statement
`to a specified length.
`
`truncated binary exponential backoff In a local area
`network, the algorithm used to schedule retransmission
`after a collision such that the retransmission is delayed
`by an amount of time derived from the slot time and
`the numberof attempts to retransmit.
`(T)
`
`truncation (1) The deletion or omission of a leading
`or ofa trailing portion of a String in accordance with
`specified criteria.
`(I)
`(A)
`(2) The termination of a
`computation process, before its final conclusion or
`natural termination, if any, in accordance with speci-
`fied rules.
`(I)
`(A)
`(3) Contrast with round.
`
`truncation error An error due totruncation. @ (A)
`trunk (1) In telephony,
`circuits
`that connect
`two
`switching systems, as opposed to connecting a cus-
`tomer line to a switching system.
`(2) A telephone
`channel between two central offices or
`switching
`devices that
`is used in providing a telephone con-
`nection between subscribers.
`(3) See
`tie
`trunk.
`(4) See also line, link, path, route.
`
`trunk cable (1) A cable connecting trunk coupling
`units
`for
`the purpose of allowing communication
`among data stations.
`(T)
`(2) In an ESCONenvi-
`fonment, a cable consisting of multiple fiber pairs that
`do not directly attach to an active device. This cable
`usually exists between distribution panels and can be
`located within, or external
`to, a building. Contrast
`with jumpercable.
`
`inserting the station into the network or having it
`bypassed.
`(T)
`
`trunk exchange An exchange devoted primarily to
`interconnecting trunks.
`
`trunk group Those trunks between two points, both
`of which are switching centers,
`individual message
`distribution points, or both, and that use the same mul-
`tiplex terminal equipments.
`
`trunk hunting A method of switching incomingcalls
`to the next consecutive or next available numberif the
`first called numberis busy.
`
`trunk line A telecommunication line that
`private telecommunication system to a public switched
`network.
`
`trusted computer system In computer
`system that employs sufficient hardware and software
`data integrity measures to allow simultaneous proc-
`essing of a range of sensitive or classified information.
`
`trusted computing base (TCB) In computer security,
`all of the protection mechanisms within a computer
`system,
`including hardware, software, and firmware,
`the combination of which enforces a security policy.
`It creates a basic protection environment and provides
`additional user services required for a trusted computer
`system.
`
`Trusted Computing System Evaluation Criteria In
`computer security, a standard of the U.S. Government
`for the evaluation of trusted computer systems. Syn-
`onymous with Orange Book.
`
`trusted path In computer security, a mechanism by
`which a person at a terminal can communicate directly
`with the trusted computing base. This mechanism can
`be activated only by the person or the trusted com-
`puting base and cannot be imitated by untrusted soft-
`ware.
`
`trusted software In computer security,
`portion of a trusted computing base.
`
`truth table (1) An operation table for a logic opera-
`tion. (I)
`(A)
`(2) A table that describes a logic
`function by listing all possible combinations of input
`values and indicating for each combination the output
`value. (A)
`
`the representation of the
`truth value In COBOL,
`result of the evaluation of a condition in terms of one
`of two values:
`true, false.
`
`trunk coupling unit A physical device that connects
`a data station to a trunk cable by means of a drop
`
`TS Transmission services.
`
`Ex. 1010 / Page 3 of 3
`
`Ex. 1010 / Page 3 of 3
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket