Sarma
Sarma Adithe Venkata Ram, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20100169488 | SYSTEM AND METHOD OF CONSOLIDATED CENTRAL USER ADMINISTRATIVE PROVISIONING - In one embodiment the present invention includes a computer-implemented method of reducing a quantity of business application programming interface (BAPI) calls in a hardware client-server environment. The method includes configuring a centralized provisioning system on a hardware server with access definitions for systems. The method further includes receiving, by the centralized provisioning system, a provisioning request for a user of a client to access the systems. The method further includes determining a collected BAPI call according to the access definitions. The method further includes providing access to the user according to the collected BAPI call. | 07-01-2010 |
20140297873 | System and Method of Consolidated Central User Administrative Provisioning - In one embodiment the present invention includes a computer-implemented method of reducing a quantity of business application programming interface (BAPI) calls in a hardware client-server environment. The method includes configuring a centralized provisioning system on a hardware server with access definitions for systems. The method further includes receiving, by the centralized provisioning system, a provisioning request for a user of a client to access the systems. The method further includes determining a collected BAPI call according to the access definitions. The method further includes providing access to the user according to the collected BAPI call. | 10-02-2014 |
Sarma Adithe Venkata Ram, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20130085800 | System and Method of Business Risk Based Authorization - A system and method of authorizing access in a computer system. The method includes receiving a request to use the computer system, reading authorization data associated with the user, and denying the request according to the authorization data. The method further includes determining a business process risk associated with the request and comparing a characteristic of the request and the business process risk. The method further includes authorizing the request to use the computer system by the user when the business process risk exceeds the characteristic. In this manner, the delay involved in performing the normal access provisioning process is avoided for situations in which the business risk exceeds the cost of the delay. | 04-04-2013 |
Sarma Duddu, Concord, MA US
Patent application number | Description | Published |
---|---|---|
20120089122 | TIME-SELECTIVE BIORESORBABLE OR COLLAPSIBLE DRUG DELIVERY SYSTEMS AND METHODS - Implantable medical devices and treatment methods are provided, particularly for use in the bladder. The device is configured for retention in the bladder for at least a portion of the drug delivery period and includes at least one biodegradable component such that following a biodegradation at a selected time, the retention function is lost and the device or portions thereof are resorbed and/or excreted. The method may include deploying into the bladder of a patient a device having a device structure housing a drug formulation comprising at a drug; releasing drug from the device structure into the bladder; and then, changing the composition of urine in the bladder, e.g., by altering the pH, to trigger degradation of at least part of the device structure to enable the device structure or parts thereof to be excreted from the bladder. | 04-12-2012 |
Sarma Pydipally, Watertown, MA US
Patent application number | Description | Published |
---|---|---|
20120117599 | THUMBNAIL PUBLICATION - A video service provider system may include one or more devices. The one or more device may receive thumbnails of programs that are currently airing on a group of television channels and match the received thumbnails with metadata. The metadata may include information relating to at least one of the television channels or the programs. The one or more devices may further provide, to a remote device, a set of thumbnails, of the captured thumbnails, and the metadata matching the set of thumbnails. The remote device may make the set of thumbnails and the metadata available to a user. | 05-10-2012 |
20140289773 | THUMBNAIL PUBLICATION - A video service provider system may include one or more devices. The one or more device may receive thumbnails of programs that are currently airing on a group of television channels and match the received thumbnails with metadata. The metadata may include information relating to at least one of the television channels or the programs. The one or more devices may further provide, to a remote device, a set of thumbnails, of the captured thumbnails, and the metadata matching the set of thumbnails. The remote device may make the set of thumbnails and the metadata available to a user. | 09-25-2014 |
Sarma Tanuku, Freehold, NJ US
Patent application number | Description | Published |
---|---|---|
20100118709 | METHOD AND APPARATUS FOR PROVIDING END TO END VIRTUAL PRIVATE NETWORK PERFORMANCE MANAGEMENT - A method and apparatus for managing a virtual private network are disclosed. For example, the method collects performance data for at least one parameter from a plurality of customer edge routers and a plurality of provider edge routers associated with the virtual private network. The method correlates the performance data for identifying one or more performance exceptions based on a threshold for each of the at least one parameter, and performs a trending analysis using the one or more performance exceptions to predict a potential problem that will impact the virtual private network. | 05-13-2010 |
20130003593 | METHOD AND APPARATUS FOR PROVIDING END TO END VIRTUAL PRIVATE NETWORK PERFORMANCE MANAGEMENT - A method and apparatus for managing a virtual private network are disclosed. For example, the method collects performance data for at least one parameter from a plurality of customer edge routers and a plurality of provider edge routers associated with the virtual private network. The method correlates the performance data for identifying one or more performance exceptions based on a threshold for each of the at least one parameter, and performs a trending analysis using the one or more performance exceptions to predict a potential problem that will impact the virtual private network. | 01-03-2013 |
Sarma Vrudhula, Chandler, AZ US
Patent application number | Description | Published |
---|---|---|
20090235216 | Combinational Equivalence Checking for Threshold Logic Circuits - Aspects of a method and system for combinational equivalence checking for threshold logic circuits are provided. In this regard, one or more inputs may be received at a threshold logic gate. The threshold function of the threshold logic gate may be recursively decomposed into a first function and a second function using cofactors of the threshold function. A Boolean function representation of the threshold logic gate may be generated based on the recursive decomposition of the threshold function. The generated Boolean function representation of the threshold logic gate may be a maximally factored form representation of a minimal sum of products (SOP) for the threshold logic gate. A logical equivalence of the threshold logic gate may be verified with one or more other logic circuits based on the generated Boolean function representation of the threshold logic gate. | 09-17-2009 |
20100321061 | THRESHOLD LOGIC ELEMENT HAVING LOW LEAKAGE POWER AND HIGH PERFORMANCE - Embodiments of a threshold logic element are provided. Preferably, embodiments of the threshold logic element discussed herein have low leakage power and high performance characteristics. In the preferred embodiment, the threshold logic element is a threshold logic latch (TLL). The TLL is a dynamically operated current-mode threshold logic cell that provides fast and efficient implementation of digital logic functions. The TLL can be operated synchronously or asynchronously and is fully compatible with standard Complementary Metal-Oxide-Semiconductor (CMOS) technology. | 12-23-2010 |
20110214095 | DECOMPOSITION BASED APPROACH FOR THE SYNTHESIS OF THRESHOLD LOGIC CIRCUITS - Systems and methods for identifying a Boolean function as either a threshold function or a non-threshold function are disclosed. In one embodiment, in order to identify a Boolean function as either a threshold function or a non-threshold function, a determination is first made as to whether the Boolean function satisfies one or more predefined conditions for being a threshold function, where the one or more predefined conditions include a condition that both a positive cofactor and a negative cofactor of the Boolean function are threshold functions. If the one or more predefined conditions are satisfied, a determination is made as to whether weights for the positive and negative cofactors are equal. If the weights for the cofactors are equal, then the Boolean function is determined to be a threshold function. Further, in one embodiment, this threshold function identification process is utilized in a threshold circuit synthesis process. | 09-01-2011 |
20130313623 | THRESHOLD GATE AND THRESHOLD LOGIC ARRAY - Threshold gates and related circuitry are disclosed. In one embodiment, a threshold gate includes a threshold realization element and a magnetic tunnel junction (MTJ) element. The MTJ element is switchable from a first resistive state to a second resistive state. To realize a threshold function with the MTJ element, the threshold realization element is configured to switch the magnetic tunnel junction element from the first resistive state to the second resistive state in accordance with the threshold function. In this manner, the threshold gate may implement a threshold function that provides an output just like a complex Boolean function requiring several Boolean gates. | 11-28-2013 |
20130339914 | TECHNOLOGY MAPPING FOR THRESHOLD AND LOGIC GATE HYBRID CIRCUITS - A method of mapping threshold gate cells into a Boolean network is disclosed. In one embodiment, cuts are enumerated within the Boolean network. Next, a subset of the cuts within the Boolean network that are threshold is identified. To minimize power, cuts in the subset of the cuts are selected. | 12-19-2013 |
20140277815 | PROCESSOR CONTROL SYSTEM - A control system for use with a processor includes: (i) a controller configured to receive prediction information for a predicted temperature associated with the processor, and to determine a speed of operation for the processor based at least on a thermal model of the processor and the predicted temperature, where the speed supports an operational objective of the processor; and (ii) an error estimator that is separate from the controller, and that is configured to receive temperature information obtained from the processor operating at the speed, to determine updated prediction information based, at least in part, on the temperature information, and to output the updated prediction information to the controller. | 09-18-2014 |
20140281609 | DETERMINING PARAMETERS THAT AFFECT PROCESSOR ENERGY EFFICIENCY - An example process for controlling a processor may include: (i) obtaining parameters associated with operation of a processor, where each of the parameters has a different time scale; (ii) performing an iterative process to identify ones of the parameters that achieve a particular energy efficiency in the processor, where the energy efficiency of the processor corresponds to a quasi-concave function having a maximum that corresponds to the ones of the parameters; and (iii) controlling the processor using the ones of the parameters. | 09-18-2014 |