会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Dynamic algorithm selection for volume rendering, isocontour and body
extraction within a multiple-instruction, multiple-data multiprocessor
    • 在多指令多数据多处理器内进行体绘制,异构和身体抽取的动态算法选择
    • US5201035A
    • 1993-04-06
    • US549870
    • 1990-07-09
    • Martin R. StytzOphir Frieder
    • Martin R. StytzOphir Frieder
    • G06T17/00
    • G06T17/00
    • This is a methodology which reduces the time required to render a volume with extracted isocontours and inserted cutting plane and perform an arbitrary rotation within a three-dimensional volume. The volume is first partitioned among the processors of a multiple-instruction, multiple-data (MIMD) multiprocessor computer. As the user indicates the isocontour to be extracted, rotation, and cutting plane to be inserted into the image space volume, each processor independently selects the optimum algorithm for rendering the volume using the indicated display parameters on its local data set. If the processor is fully behind the cutting plane, a front-to-back (FTB) volume rendering algorithm is used. If the cutting plane lies behind the cutover point, then a back-to-front (BTF) volume rendering algorithm is used, otherwise the FTB volume rendering algorithm is used.
    • 这是一种减少使用提取的异形体和插入的切割平面呈现卷的时间并在三维体积内执行任意旋转所需的时间的方法。 该卷首先在多指令多数据(MIMD)多处理器计算机的处理器之间划分。 当用户指示要提取的等离子体,旋转和切割平面插入到图像空间体积中时,每个处理器独立地选择用于在其本地数据集上使用指示的显示参数呈现卷的最佳算法。 如果处理器完全落在切割平面之后,则使用前后(FTB)体绘制算法。 如果切割平面位于切割点之后,则使用背对背(BTF)体绘制算法,否则使用FTB体绘制算法。
    • 2. 发明授权
    • Method and apparatus for preventing network traffic analysis
    • 防止网络流量分析的方法和装置
    • US06917974B1
    • 2005-07-12
    • US10039575
    • 2002-01-03
    • Martin R. StytzSheila B. Banks
    • Martin R. StytzSheila B. Banks
    • G06F11/30G06F15/173H04L29/06
    • H04L63/04H04L63/0478H04L63/1475
    • A system and method for generating and transmitting false packets along with a true packet to thereby hide or obscure the actual message traffic. A new extension header having a plurality of fields is positioned in the hierarchy of Internet protocol headers that control passage of the false packets and the true packet through the network. A sending host computer generates a plurality of false packets for each true packet and transmits the false packets and the true packet containing the Internet protocol headers and the extension header over the network. The new extension header is decrypted and re-encrypted each host that handles a message packet that uses the new extension header to control the random re-encryption of the true packet body at random hosts and the random generation of false packets at each host visited by a true packet, at the recipient of the true packet, and at any hosts that receive a false packet.
    • 一种用于生成和传送假数据包以及真实数据包的系统和方法,从而隐藏或模糊实际消息流量。 具有多个字段的新的扩展报头位于因特网协议报头的层级中,其通过网络控制虚假分组和真实分组的传递。 发送主计算机为每个真实分组生成多个虚假分组,并通过网络发送包含互联网协议报头和扩展报头的虚假分组和真实分组。 新的扩展头被解密并重新加密处理使用新的扩展头的消息分组的每个主机来控制随机主机处的真实分组主体的随机重新加密,并且随机生成每个主机访问的虚假分组 真正的数据包,真实数据包的收件人,以及任何收到虚假数据包的主机。
    • 4. 依法登记的发明
    • Software architecture and design for facilitating prototyping in distributed virtual environments
    • USH2201H1
    • 2007-09-04
    • US10094738
    • 2002-03-11
    • Martin R. StytzSheila B. Banks
    • Martin R. StytzSheila B. Banks
    • G06F9/44
    • The invention is a data-handling architecture that exploits the technical advantages offered by object-oriented techniques, classes, data containers, component software, object frameworks, containerization, design patterns, and a central runtime data repository. The architecture is based on the Common Object DataBase (CODB), frameworks, components, objects, information streams, and containers. The software exploits the Extensible Markup Language (XML), employs software gauges, and uses intelligent agents to aid in assembly, diagnosis, evaluation, composition, and re-configuration of a DATE-based application. The architecture of the present invention is defined by highly-modular components where interdependencies are well-defined and minimized. Components define the major aspects of the inventive architecture, objects are used to flesh out the specification, design, and implementation of the components. The invention's architecture can support the dynamic loading of any of the components or major objects in any component required without re-linking or recompiling software. Within the architecture, data is transmitted between components only along information streams within containers using the Extensible Markup Language (XML).