WIPO logo
Mobile | Deutsch | Español | Français | 日本語 | 한국어 | Português | Русский | 中文 |
PATENTSCOPE

Search International and National Patent Collections
World Intellectual Property Organization
Search
 
Browse
 
Translate
 
Options
 
News
 
Login
 
Help
 
Results 1-10 of 898,299 for Criteria: Office(s):all Language:FR Stemming: true maximize
préc. 1 2 3 4 5 6 7 8 9 10 suiv.
Page: / 89830  Go >
RSS iconmap icon 

Analysis
Analysis

List Length
Machine translation
TitleCtrPubDate
Int.ClassAppl.NoApplicantInventor
1. WO/2015/041633 CYCLICAL DIVERSION TECHNIQUES IN SUBTERRANEAN FRACTURING OPERATIONSWO26.03.2015
E21B 43/27
PCT/US2013/060174HALLIBURTON ENERGY SERVICES, INC.WALTERS, Harold G.
The present disclosure relates generally to subterranean operations and, more particularly, to fracturing a subterranean formation. In one embodiment, the present disclosure provides a method comprising: introducing into a wellbore penetrating a portion of a subterranean formation alternating intervals of a particulate-laden fluid comprising a plurality of particulates sized 100 U.S. mesh or smaller, and a treatment fluid comprising a lesser amount of particulates than the particulate-laden fluid; wherein the alternating intervals of the particulate-laden fluid and the treatment fluid are introduced into the wellbore at or above a pressure sufficient to create or enhance one or more fractures in the subterranean formation.

2. WO/2015/041636 VIRTUAL MACHINE SWITCHING BASED ON PROCESSOR POWER STATESWO26.03.2015
G06F 1/32
PCT/US2013/060192EMPIRE TECHNOLOGY DEVELOPMENT, LLCKRUGLICK, Ezekiel
Technologies are generally provided to switch virtual machines based on processor power states. In some examples, a virtual machine manager (VMM) may determine that a processor configured to execute a first virtual machine (VM) is to execute a VM switch, and cause the processor to enter a low-power state and store a first VM state. The VMM, which may be a VM itself, may then replace the stored first VM state with a second VM state and cause the processor to exit the low-power state. When the processor exits the low-power state, it may load the second VM state and execute a second VM.

3. WO/2015/041703 A SOLIDIFIED, THERMALLY INSULATING COMPOSITIONWO26.03.2015
B29C 59/02
PCT/US2013/061250HALLIBURTON ENERGY SERVICES, INC.KALGAONKAR, Rajendra, A.
A thermally insulating composition comprises: (A) an aqueous liquid, wherein the aqueous liquid is the continuous phase of the composition; (B) a particulate, wherein the particulate is silica, and wherein the particulate is a dispersed phase of the composition; and (C) an activator, wherein the activator causes at least some of the particulate to aggregate and form a network of at least the particulate, wherein the formation of the network causes the insulating composition to become a gel, and wherein the gelled insulating composition inhibits or prevents heat loss from two areas having different temperatures. A method of thermally insulating a portion of an annulus comprises: introducing the insulating composition into a portion of an annulus, wherein the gelled insulating composition inhibits or prevents heat loss from the portion of the annulus to an area adjacent to the outside of a second object.

4. WO/2015/041685 HARDWARE-ASSISTED LOG PROTECTION DEVICES AND SYSTEMSWO26.03.2015
G06F 12/14
PCT/US2013/060964GEORGIA TECH RESEARCH CORPORATIONLEE, Junghee
A hardware-assisted technique may protect a system log from attackers, regardless of an attacker's acquired privileges at the host system. In some embodiments, the technique may employ specialized hardware, e.g., in the form of an add-on peripheral card. The hardware may be connected to a commodity server through a standard bus. Said hardware may stores log files from a host system while permitting only read and append operations from the host system. Thus, even if the attacker obtains root privileges at the host system, removal through the host system of logs may be prevented because the asymmetric interface does not support such commands from the host system. In some embodiments, an existing log file storage path at the host system may be maintained, reducing the required change to implement the disclosed techniques within existing server setups. Further, any performance degradation due to the techniques may be small to negligible.

5. WO/2015/041632 ESTIMATION AND CALIBRATION OF DOWNHOLE BUCKLING CONDITIONSWO26.03.2015
E21B 47/007
PCT/US2013/060171HALLIBURTON ENERGY SERVICES, INC.SAMUEL, Robello
A method for estimating an axial force transfer efficiency of a drillstring in a borehole includes lifting the drillstring so that the drill bit is off the bottom of the borehole, measuring a hook load, slacking off a first reference amount of the hook load, determining a first weight on bit at the bottom of the drillstring and determining the axial force transfer efficiency based, at least in part, on the measured hook load, the first weight on bit, and the first reference amount of hook load.

6. WO/2015/041630 REMOVAL OF STICK-SLIP VIBRATIONS IN A DRILLING ASSEMBLYWO26.03.2015
E21B 17/07
PCT/US2013/060162HALLIBURTON ENERGY SERVICES, INC.DYKSTRA, Jason, D.
An example method for removal of stick-slip vibrations may comprise receiving a command directed to a controllable element of a drilling assembly. A smooth trajectory profile may be generated based, at least in part, on the command. A frictional torque value for a drill bit of the drilling assembly may be determined. The example method may further include generating a control signal based, at least in part, on the trajectory profile, the frictional torque value, and a model of the drilling assembly, and transmitting the control signal to the controllable element.

7. WO/2015/041701 VALIDATE WRITTEN DATAWO26.03.2015
G06F 11/08
PCT/US2013/061233HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.BENEDICT, Melvin K.
Data and a first error detection code related to the data is received. That the received data is written correctly to a memory is validated based on the first error detection code and/or a comparison of the written data to the received data. An alert is generated if it is determined that the written data is incorrect.

8. WO/2015/041680 COMPOSITIONS AND METHODS RELATED TO OAT SENSITIVITYWO26.03.2015
A61K 39/00
PCT/US2013/060939IMMUSANT, INC.ANDERSON, Robert, P.
Provided herein are methods, kits and compositions related to identifying or treating a subject sensitive to or likely to be sensitive to oats.

9. WO/2015/041658 TECHNOLOGIES FOR SYNCHRONIZING AND RESTORING REFERENCE TEMPLATESWO26.03.2015
H04L 9/30
PCT/US2013/060695INTEL CORPORATIONSMITH, Ned M.
Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices. In some embodiments one or more client devices may register with a synchronization server and provide encrypted copies of their reference templates to the server. In a restoration operation, the synchronization server may provide an encrypted copy of a client's reference template(s) to the client, which may decrypt them in a protected environment. In a synchronization operation, the synchronization server may provide encrypted copy of a first client's template(s) to a plurality of second clients. The second clients may then decrypt the encrypted template(s) within a protected environment using an appropriate decryption key.

10. WO/2015/041669 METHODS FOR ENHANCING AND MAINTAINING FRACTURE CONDUCTIVITY AFTER FRACTURING SHALE FORMATIONS WITHOUT PROPPANT PLACEMENTWO26.03.2015
E21B 43/27
PCT/US2013/060876HALLIBURTON ENERGY SERVICES, INC.NGUYEN, Philip, D.
A method of treating a subterranean shale formation includes placing a first treatment fluid comprising a fracturing fluid in the formation; forming fractures; placing a second fluid including a sloughing agent or eroding agent in the formation; allowing gaps in the fracture faces to form; placing a third fluid including a formation stabilizer and an agglomerating agent into the fractures; and allowing the third fluid to absorb into the formation, thereby stabilizing the shale formation fracture faces and transforming the solid shale particulates into proppant clusters.


Results 1-10 of 898,299 for Criteria: Office(s):all Language:FR Stemming: true
préc. 1 2 3 4 5 6 7 8 9 10 suiv.