会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • DETERMINING COST OPTIMIZATION BASED ON CONSTRAINTS ON SKI-RENTAL PROBLEMS
    • 基于滑坡问题的约束条件确定成本优化
    • US20140188656A1
    • 2014-07-03
    • US13727852
    • 2012-12-27
    • Krishna P. Puttaswamy NagaMurali KodialamAli Khanafer
    • Krishna P. Puttaswamy NagaMurali KodialamAli Khanafer
    • G06Q30/06
    • G06Q30/0631
    • A constrained ski-rental problem is defined. In the constrained ski-rental problem, a determination as to whether a first action having a first cost associated therewith or a second action having a second cost associated therewith is more cost effective is performed based on moment information associated with events related to the first action or the second action. The moment information may include a moment of the occurrences distribution of events related to the first and second actions. The moment information may include a moment of a number of occurrences of events related to the first and second actions, a moment of the inter-event times of occurrences of events related to the first and second actions, or the like. The moment information may include a first moment, a second moment, or the like.
    • 限定了滑雪租赁问题。 在限制的滑雪租赁问题中,基于与第一动作相关联的事件相关联的时刻信息来执行关于具有与其相关联的第一成本的第一动作或与其相关联的具有第二成本的第二动作是否更具成本效益的确定 或第二动作。 时刻信息可以包括与第一和第二动作有关的事件的发生发生的时刻。 时刻信息可以包括与第一和第二动作相关的事件发生次数的时刻,与第一和第二动作相关的事件的事件发生时间的时刻等。 时刻信息可以包括第一时刻,第二时刻等。
    • 4. 发明授权
    • Probabilistic fingerprint checking for preventing data leakage
    • 用于防止数据泄漏的概率指纹检查
    • US08566373B2
    • 2013-10-22
    • US13367441
    • 2012-02-07
    • Fang HaoKrishna P. Puttaswamy NagaMurali KodialamTirunell V. Lakshman
    • Fang HaoKrishna P. Puttaswamy NagaMurali KodialamTirunell V. Lakshman
    • G06F17/30
    • G06F17/30109G06F21/6236
    • A data-leakage prevention capability is presented herein. The data-leakage prevention capability prevents leakage of data, of a file set having a plurality of files, from a secure network using online fingerprint checking of data flows at a boundary of the secure network. The online fingerprint checking is performed using a set of data structures configured for the file set. The data structures for the file set are configured based on file set characteristics information of the file set and a target detection lag indicative of a maximum number of bits within which a data leakage event for the file set is to be determined. The data structure configuration is computed for a plurality of data structures configured for use in monitoring the files of the file set. The data structure configuration includes a plurality of data structure locations and data structure sizes for the respective plurality of data structures.
    • 本文介绍了数据泄漏防护功能。 数据泄漏防止能力通过使用在安全网络的边界上的数据流的在线指纹检查来防止来自安全网络的具有多个文件的文件组的数据的泄漏。 使用为文件集配置的一组数据结构来执行在线指纹检查。 文件集的数据结构是基于文件集的文件集特征信息和指示要确定文件集的数据泄漏事件的最大位数的目标检测滞后来配置的。 为配置为用于监视文件集文件的多个数据结构计算数据结构配置。 数据结构配置包括用于各个多个数据结构的多个数据结构位置和数据结构大小。
    • 6. 发明申请
    • PROBABILISTIC FINGERPRINT CHECKING FOR PREVENTING DATA LEAKAGE
    • 用于防止数据泄漏的指纹指纹检查
    • US20130204903A1
    • 2013-08-08
    • US13367441
    • 2012-02-07
    • Fang HaoKrishna P. Puttaswamy NagaMurali KodialamTirunell V. Lakshman
    • Fang HaoKrishna P. Puttaswamy NagaMurali KodialamTirunell V. Lakshman
    • G06F7/00
    • G06F17/30109G06F21/6236
    • A data-leakage prevention capability is presented herein. The data-leakage prevention capability prevents leakage of data, of a file set having a plurality of files, from a secure network using online fingerprint checking of data flows at a boundary of the secure network. The online fingerprint checking is performed using a set of data structures configured for the file set. The data structures for the file set are configured based on file set characteristics information of the file set and a target detection lag indicative of a maximum number of bits within which a data leakage event for the file set is to be determined. The data structure configuration is computed for a plurality of data structures configured for use in monitoring the files of the file set. The data structure configuration includes a plurality of data structure locations and data structure sizes for the respective plurality of data structures.
    • 本文介绍了数据泄漏防护功能。 数据泄漏防止能力通过使用在安全网络的边界上的数据流的在线指纹检查来防止来自安全网络的具有多个文件的文件组的数据的泄漏。 使用为文件集配置的一组数据结构来执行在线指纹检查。 文件集的数据结构是基于文件集的文件集特征信息和指示要确定文件集的数据泄漏事件的最大位数的目标检测滞后来配置的。 为配置为用于监视文件集文件的多个数据结构计算数据结构配置。 数据结构配置包括用于各个多个数据结构的多个数据结构位置和数据结构大小。
    • 8. 发明申请
    • PACKET PROCESSING USING BRAIDED TRIES
    • 使用BRAIDED TRIES进行分组处理
    • US20100316051A1
    • 2010-12-16
    • US12482533
    • 2009-06-11
    • Haoyu SongMurali KodialamFang HaoT.V. Lakshman
    • Haoyu SongMurali KodialamFang HaoT.V. Lakshman
    • H04L12/56
    • H04L45/00H04L45/742
    • Packets are processed (e.g., routed or classified) in accordance with a braided trie, which represents the combination of two or more different original tries (e.g., representing different forwarding/classification tables). The different tries are combined by twisting the mappings for specific trie nodes to make the shapes of the different tries more similar. Each node in the braided trie contains a braiding bit for at least one original trie indicating the mapping for that trie's node. Trie braiding can significantly reduce the number of nodes used to represent the different original tries, thereby reducing memory usage and improving scalability. Braided tries can be used for such applications as virtual routers and packet classification in which different forwarding/classification tables are represented by a single braided trie stored in shared memory.
    • 数据包根据编织特技进行处理(例如,路由或分类),其代表两个或多个不同的原始尝试的组合(例如,表示不同的转发/分类表)。 通过扭转特定特里节点的映射来组合不同的尝试,使不同尝试的形状更相似。 编织特技中的每个节点包含至少一个原始特里的编织位,指示该特里节点的映射。 Trie编织可以显着减少用于表示不同原始尝试的节点数量,从而减少内存使用并提高可扩展性。 编织的尝试可以用于虚拟路由器和分组分类等应用,其中不同的转发/分类表由存储在共享存储器中的单个编织线索表示。
    • 9. 发明申请
    • IDENTIFYING RFID CATEGORIES
    • 识别RFID类别
    • US20100295659A1
    • 2010-11-25
    • US12470061
    • 2009-05-21
    • Murali KodialamThyaga NandagopalWing C. Lau
    • Murali KodialamThyaga NandagopalWing C. Lau
    • H04Q5/22
    • G06K7/0008G06K7/10059
    • The set T of all categories in a population of RFID tags is estimated within a specified error bound. For each of one or more frames, a reader broadcasts a probability p, a multiplicity d, a frame size M, and a seed value R to the present tags. A deterministic algorithm on each tag, and known to the reader, calculates (i) whether the tag will transmit in this frame, and, if so, (ii) in which slots the tag will transmit a single “1.” When the tags have responded, the reader calculates set T by initially assuming that all possible categories are in set T and then eliminating those categories that would have transmitted in those slots in which no tag transmitted. Alternatively, the reader initially assumes that set T is empty, and adds those categories that would have transmitted in those slots in which one or more tags did transmit.
    • 估计RFID标签中所有类别的集合T在指定的误差范围内。 对于一个或多个帧中的每一个,读取器向当前标签广播概率p,多重度d,帧大小M和种子值R. 每个标签上的确定性算法,并且由读者知道,计算(i)标签是否将在该帧中传输,如果是,则(ii)标签将在哪个时隙中传送单个“1”。当标签 读者通过最初假设所有可能的类别都在T中计算集合T,然后消除那些在没有标签发送的那些时隙中传送的类别。 或者,读取器最初假设集合T为空,并且添加将在一个或多个标签确实发送的那些时隙中传送的那些类别。