Udupa
Anand Hariraj Udupa, Richardson, TX US
Patent application number | Description | Published |
---|---|---|
20090184853 | ANALOG TO DIGITAL CONVERTER WITH IMPROVED INPUT OVERLOAD RECOVERY - An aspect of the present invention avoids an amplifier of an analog to digital converter (ADC) from entering a saturation region. In an embodiment, a sample of an input signal to an ADC is compared with the upper and lower full-scale levels of the ADC. If input overload is detected, inputs to amplifiers in an input stage of the ADC are forced to zero for the duration of the input overload, and are thus prevented from going into saturation. Input overload conditions are signaled directly to an output digital block of the ADC, which provides output digital codes equivalent to either the upper or the lower full scale level depending on whether the input overload is signaled as exceeding the upper level or the lower level. Input overload recovery time of the ADC may thus be minimized. | 07-23-2009 |
20090295363 | Voltage Reference With Improved Linearity Addressing Variable Impedance Characteristics At Output Node - A voltage reference containing a programmable resistance portion at an output node at which an output reference voltage is provided. The desired magnitude of the programmable portion which provides optimum matching of an output resistance of the voltage reference and a series resistance of an output capacitor of the voltage reference is determined and hard-programmed. As a result, the output voltage of the voltage reference is provided with improved linearity. In an embodiment, the determination of the magnitude of the programmable portion is performed by providing an input to an analog to digital converter (ADC) with the voltage reference driving the ADC. The resistance setting corresponding to the third harmonic being less than a desired threshold is then hard-programmed. In an alternative embodiment, the programmable portion is set to specific resistance dynamically during operation. | 12-03-2009 |
Chetan Udupa, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20120208153 | Systems and Methods Providing Distributed Training Simulations - Systems and methods providing distributed training simulations are provided. A system may include a trainer station computer in operable communication with multiple trainee workstation computers. The trainer station computer can be operable to: facilitate simulation of plant operations on at least one of the trainee workstation computers; and monitor operations performed by at least one of the trainee workstation computers. The trainee workstation computers can be operable to: display the simulation of plant operations to a user; receive control instructions input to cause a change in the simulation of plant operations; and transmit to the trainer station computer information associated with at least one of: (a) the control instructions input; or (b) the change in the simulation of plant operations. | 08-16-2012 |
Jayaram K. Udupa, Audubon, PA US
Patent application number | Description | Published |
---|---|---|
20080205721 | Segmentation Method Using An Oriented Active Shape Model - An improved method of segmenting medical images includes aspects of live wire and active shape models to determine the most likely segmentation given a shape distribution that satisfies boundary location constrains on an item of interest. The method includes a supervised learning portion to train and learn new types of shape instances and a segmentation portion to use the learned model to segment new target images containing instances of the shape. The segmentation portion includes an automated search for an appropriate shape and deformation of the shape to establish a best oriented boundary for the object of interest on a medical image. | 08-28-2008 |
Narendranath Udupa, Karnata Ka IN
Patent application number | Description | Published |
---|---|---|
20080276045 | Apparatus and Method for Dynamic Cache Management - The apparatus of the present invention improves performance of computing systems by enabling a multi-core or multi-processor system to deterministically identify cache memory ( | 11-06-2008 |
Sharath Kodi Udupa, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150278315 | DATA FITTING SELECTED VISUALIZATION TYPE - A mechanism to visualize data to a user in a sufficient manner. The user selects a visualization type to visualize a selected subset of a data model. To fit the data well into a visualization of that visualization type, the system then evaluates the user selections of the visualization type of the subset of data against the rule set. Based on the evaluation, the system determines that the subset of data does not populate or insufficiently populates the visualization type. In some embodiments, the system further recommends additional data to supplement the selected subset of data to more sufficiently utilize the visualization to display the subset of data in conjunction with the supplemented data. The system may further display the visualization based on the selected subset of the data model perhaps before and/or after supplemented with the supplemented data. | 10-01-2015 |
Sivaprasad Udupa, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20120117375 | SYSTEMS AND METHODS FOR OPTIMIZING SSL HANDSHAKE PROCESSING - A method for buffering SSL handshake messages prior to computing a message digest for the SSL handshake includes: conducting, by an appliance with a client, an SSL handshake, the SSL handshake comprising a plurality of SSL handshake messages; storing, by the appliance, the plurality of SSL handshake messages; providing, by the appliance to a message digest computing device in response to receiving a client finish message corresponding to the SSL handshake, the plurality of SSL handshake messages; receiving, by the appliance from the message digest computing device, a message digest corresponding to the provided messages; determining by the appliance, the message digest matches a message digest included in the SSL client finish message; and completing, by the appliance with the client, the SSL handshake. Corresponding systems are also described. | 05-10-2012 |
Sivaprasad Udupa, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20100125903 | TRAFFIC REDIRECTION IN CLOUD BASED SECURITY SERVICES - Systems, methods and apparatus for tunneling in a cloud based security system. Management of tunnels, such as data tunnels, between enterprises and processing nodes for a security service is facilitate by the use of virtual gateway nodes and migration failover to minimize traffic impacts when a tunnel is migrated from one processing node to another processing node. | 05-20-2010 |
Sivaprasad Udupa, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120265991 | SYSTEMS AND METHODS FOR OPTIMIZING SSL HANDSHAKE PROCESSING - A method for enabling efficient SSL handshakes through pre-computing of handshake messages, the method includes: receiving, by an appliance, a server certificate identifying a server; generating, by the appliance, at least one of: (i) an SSL server certificate message comprising the received server certificate, (ii) an SSL client certificate request message, and (iii) an SSL hello done message; storing, by the appliance, the generated messages; receiving, by the appliance from a client, an SSL client hello message identifying the server; and transmitting, by the appliance to the client, an SSL server hello message and at least one of the stored messages. Corresponding systems are also described. | 10-18-2012 |
20130145146 | SYSTEMS AND METHODS FOR BULK ENCRYPTION AND DECRYPTION OF TRANSMITTED DATA - A method for using a network appliance to efficiently buffer and encrypt data for transmission includes: receiving, by an appliance via a connection, two or more SSL records comprising encrypted messages; decrypting the two or more messages; buffering, by the appliance, the two or more decrypted messages; determining, by the appliance, that a transmittal condition has been satisfied; encrypting, by the appliance in response to the determination, the first decrypted message and a portion of the second decrypted message to produce a third SSL record; and transmitting, by the appliance via a second connection, the third record. Corresponding systems are also described. | 06-06-2013 |
Sivaprasad R. Udupa, Fort Lauderdale, FL US
Patent application number | Description | Published |
---|---|---|
20140041010 | SYSTEMS AND METHODS FOR POLICY BASED TRIGGERING OF CLIENT-AUTHENTICATION AT DIRECTORY LEVEL GRANULARITY - Systems and methods are disclosed for an appliance to authenticate access of a client to a protected directory on a server via a connection, such as a secure SSL connection, established by the appliance. A method comprises the steps of: receiving, by an appliance, a first request from a client on a first network to access a server on a second network, the appliance providing the client a virtual private network connection from the first network to the second network; determining, by the appliance, the first request comprises access to a protected directory of the server; associating, by the appliance, an authentication policy with the protected directory, the authentication policy specifying an action to authenticate the client's access to the protected directory; and transmitting, by the appliance in response to the authentication policy, a second request to the client for an authentication certificate. Corresponding systems are also disclosed. | 02-06-2014 |
Sivaprasad R. Udupa, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20110060840 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR GUARANTEED CONTENT DELIVERY INCORPORATING PUTTING A CLIENT ON-HOLD BASED ON RESPONSE TIME - An apparatus, method and computer program product for guaranteeing network client-server response time while providing a way of putting the client on-hold when the response time temporarily prohibits access to the requested server. The apparatus is implemented within an interface unit connecting a plurality of servers and an on-hold server to the Internet, which is connected to a plurality of clients. According to one aspect of the invention, the method includes the steps of opening a connection between a client and the interface unit; determining which server the client desires a page from; determining the current response time of the requested server; if the response time is acceptable then opening a connection between the interface unit and the requested server if no free connection is open between the interface unit and the requested server; allowing the client to access information on the requested server-via the connections; and closing the connection between the client and the interface unit while keeping open the connection between the interface unit and the requested server. Alternatively, if the response time is not acceptable, then putting the client on-hold by redirecting the client to an on-hold server until the response time of the requested server becomes acceptable. According to a “on-hold distribution” aspect of the invention, the interface unit determines the on-hold preference of the client and selects the server hosting that on-hold preference. According to another aspect of the invention, instead of utilizing the interface unit, each server has the intelligence to put the client on-hold when applicable. | 03-10-2011 |
Sivprasad Udupa, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090300730 | SECURITY MESSAGE PROCESSING - Systems, methods and apparatus for handling security messages in a distributed security system. Requests, replies, and/or updates have varying time constraints. Processing node managers and authority node managers determine the best transmission times and/or the ignoring of such data to maximize information value. | 12-03-2009 |
Uppinakuduru Raghavendra Udupa, Mysore IN
Patent application number | Description | Published |
---|---|---|
20120239667 | KEYWORD EXTRACTION FROM UNIFORM RESOURCE LOCATORS (URLS) - The keyword extraction technique described herein extracts keywords from Uniform Resource Locators (URLs) in web logs. The technique leverages the content and the structure of URLs to extract relevant keywords. First, a URL is divided into multiple components based on its structure. A set of keywords are extracted from each component of the URL independently with the help of a controlled vocabulary. Then a second set of keywords are generated by forming combinations of terms from different segments of the URL. Only those combinations which are present in the controlled vocabulary are retained as keywords. Finally, the keywords are scored with a function which took into account of a wide set of features. | 09-20-2012 |
20130132364 | CONTEXT DEPENDENT KEYWORD SUGGESTION FOR ADVERTISING - Various technologies described herein pertain to suggesting context dependent keywords for advertising. A set of seed queries can be identified from a context, where the context is a source keyword, a search query, a category, or a landing page. Moreover, the set of seed queries can be inputted to a search engine. A predetermined number of web pages returned by the search engine upon executing the set of seed queries can be retrieved. Candidate keywords can be extracted from the web pages returned by the search engine. Further, keywords from the candidate keywords can be selected from the candidate keywords based on relevance scores of the candidate keywords. | 05-23-2013 |
20130151533 | PROVISION OF QUERY SUGGESTIONS INDEPENDENT OF QUERY LOGS - Described herein are various technologies pertaining to provision of query suggestions to a user independent of a query log. Key phrases are automatically identified in documents of a document corpus, and a forward index and inverted index are generated. The forward index indexes key phrases by documents, and the inverted index indexes documents by key phrases. A query is received from a user, and documents relevant to the query are retrieved. Key phrases in the retrieved documents are identified via the forward index, and a subset of the key phrases are selected as query suggestions by determining coverage of the key phrases as identified in the inverted index. | 06-13-2013 |