The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
This article describes a method of managing the exchange of information between any two communicating processes using event-driven techniques.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
52% of the total text.
Page 1 of 1
Generalized Event-Driven Finite State Machine Management
This article describes a method of managing the exchange of information
between any two communicating processes using event-driven techniques.
Where two processes are engaged in the exchange of information in a
communications environment, some set of rules (protocol) must be agreed to
between the two programs in order to guarantee the integrity of the exchange.
Information exchange includes the exchange both of data and of processing
intent. This is readily evident in the analogy of a telephone conversation. There is
a generally-agreed-to protocol between a caller and callee during the telephone
conversation. The callee, for example, begins with an introduction such as
'HELLO' and may follow with an identification of himself or herself. The callee
then waits, and the caller then knows to continue by identifying himself or herself
and then stating the reason for the call, etc. Both know that the protocol does not
include talking while the other is talking, that questions expect replies, etc. At
some point, one or the other parties indicates his or her intent to end the
conversation by saying 'GOODBYE'. Unless the protocol is followed by both
parties, it is unlikely that an intelligent and meaningful exchange of information
In the data processing world, this protocol is even more critical and the
protocols themselves may vary greatly between any two communicating
programs. Each program must understand the rules for communicating and must
understand the state of the conversation if they are to communicate in a
predictable and reliable way. The set of rules and the conversation states are
collectively known as a finite state machin...