Sreedhar
Bandari Sreedhar, Karimnager IN
Patent application number | Description | Published |
---|---|---|
20110178470 | PHARMACEUTICAL COMPOSITIONS COMPRISING BORONIC ACID COMPOUNDS - Pharmaceutical compositions comprising bortezomib for oral or parenteral administration. Specific aspects relate to stable, sugar free pharmaceutical compositions of bortezomib, including its pharmaceutically acceptable salts or solvates, in the form of ready-to-use solutions, lyophilized forms, or physical admixtures, and the preparation thereof. Other aspects include processes for preparing compositions and methods of using compositions for treating various types of cancers in mammals. | 07-21-2011 |
Chandrika Malurpatna Sreedhar, Bangalore Kamataka IN
Patent application number | Description | Published |
---|---|---|
20080235683 | Data Processing System And Method - A method of producing a compartment specification for an application, the method comprising executing the application; determining resource requests made by the executing application; and recording the resource requests in the compartment specification. | 09-25-2008 |
Chandrika Malurpatna Sreedhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090013401 | Access Control System And Method - Certain embodiments of the invention relate to an access control system for controlling access to file system objects stored in a digital file system store. The system provides a first compartment rule type for granting a first permission to an entity, associated with a respective compartment to which the rule is applied, to lookup a directory object in a directory path and list the contents of the said directory object, and a second compartment rule type for granting a second permission to an entity, associated with a respective compartment to which the rule is applied, to lookup a directory object in a directory path and not to list the contents of the said directory object. | 01-08-2009 |
20090150886 | Data Processing System And Method - A method of producing a compartment specification for an application, the method comprising executing the application; determining resource requests made by the executing application; and recording the resource requests in the compartment specification. | 06-11-2009 |
Deepak Sreedhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140358515 | PRESERVING OBJECT CODE TRANSLATIONS OF A LIBRARY FOR FUTURE REUSE BY AN EMULATOR - Provided is a method of preserving object code translations of a library for future reuse by an emulator. A munmap( | 12-04-2014 |
Dheeraj Sreedhar, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150039961 | TURBO ENCODING ON A PARALLEL PROCESSOR - Methods and arrangements for parallelizing turbo encoding computations. At least one processor is provided. turbo encoding computations are split into first and second parts. Using at least one processor, the computations of the first part are performed. Thereafter, using the at least one processor, the computations of the second part are performed, the second part correcting output provided by the computations of the first part. One of the first and second parts comprises computations performed in parallel and the other of the first and second parts comprises computations performed not in parallel. Other variants and embodiments are broadly contemplated herein. | 02-05-2015 |
J.v. Sreedhar, Adyar IN
Patent application number | Description | Published |
---|---|---|
20140374858 | CAPACITIVE PRESSURE SENSOR AND A METHOD OF FABRICATING THE SAME - The invention discloses a capacitive pressure sensor and a method of fabricating the same. The capacitive pressure sensor includes a fixed plate configured as a back plate, a movable plate configured as diaphragm for sensing pressure, wherein a cavity is formed between the fixed plate and the movable plate, an isolation layer between the fixed plate and the movable plate and electrical contacts thereof for minimizing the leakage current, plurality of damping holes for configuring the contour of the fixed plate as the deflected diaphragm when pressure is exerted, a vent hole extending to the cavity having resistive air path for providing equilibrium to the diaphragm and an extended back chamber for increasing the sensitivity of the capacitive pressure sensor. The capacitive pressure sensor is also configured for minimizing parasitic capacitance. | 12-25-2014 |
J.v. Sreedhar, Adyar, Tamil Nadu IN
Patent application number | Description | Published |
---|---|---|
20140374858 | CAPACITIVE PRESSURE SENSOR AND A METHOD OF FABRICATING THE SAME - The invention discloses a capacitive pressure sensor and a method of fabricating the same. The capacitive pressure sensor includes a fixed plate configured as a back plate, a movable plate configured as diaphragm for sensing pressure, wherein a cavity is formed between the fixed plate and the movable plate, an isolation layer between the fixed plate and the movable plate and electrical contacts thereof for minimizing the leakage current, plurality of damping holes for configuring the contour of the fixed plate as the deflected diaphragm when pressure is exerted, a vent hole extending to the cavity having resistive air path for providing equilibrium to the diaphragm and an extended back chamber for increasing the sensitivity of the capacitive pressure sensor. The capacitive pressure sensor is also configured for minimizing parasitic capacitance. | 12-25-2014 |
Pranam C. Sreedhar, Punngol Field SG
Patent application number | Description | Published |
---|---|---|
20150150110 | IDENTIFYING AND DESTROYING POTENTIALLY MISAPPROPRIATED ACCESS TOKENS - A computer receives a request for protected user data with an access token presented by a client as authorization for the client to access the protected user data in a delegated environment. The computer parses the request to create a device fingerprint identifying the device submitting the request for the client. The computer compares the device fingerprint of the request to a previously stored device fingerprint of an authorized device associated with the access token. The computer automatically determines whether to identify the access token as potentially misappropriated based on the comparison of the device fingerprint of the request to the previously stored device fingerprint. | 05-28-2015 |
Rinku Sreedhar, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20130212574 | Sub-Device Discovery and Management - A sub-device agent running on a network device provides tools for detecting and managing sub-devices connected to the network device. The sub-device agent reports the presence of the sub-devices to a configuration manager, which provides a user interface for managing the sub-devices. The sub-devices are not directly detectable by or visible to the configuration manager. The sub-device agent provides access to the sub-devices for monitoring, configuring, updating, etc. The sub-device agent may be used to install or upgrade firmware or software on the sub-device or to monitor a status of the sub-device. Sub-device modules, such as OEM plug-ins and drivers, may be used by the sub-device agent to discover and manage the sub-devices. | 08-15-2013 |
Sreeresh Sreedhar, Loma Linda, CA US
Patent application number | Description | Published |
---|---|---|
20130138396 | SYSTEM AND METHOD FOR MONITORING AND MANAGING UTILITY DEVICES - A system and method for monitoring and managing utility devices is provided where performance data for each utility device is compared against performance criteria. A deficiency value is assigned to each utility device based on the comparison, and a composite deficiency surface is generated based on the deficiency values. The areas of the composite deficiency surface are classified into deficiency classes. A particular area on the composite deficiency surface associated with a particular deficiency class is identified, and a priority index for the identified area is determined based on the particular deficiency value. One or more of the identified areas of the composite deficiency surface are classified into one or more construction projects based on the priority index for the corresponding area, and at least one of the one or more construction projects is recommended to a user. | 05-30-2013 |
Vugranam C. Sreedhar, Hawthorne, NY US
Patent application number | Description | Published |
---|---|---|
20130110568 | ASSIGNING WORK ORDERS WITH CONFLICTING EVIDENCES IN SERVICES | 05-02-2013 |
Vugranam C. Sreedhar, Yorktown Heights, NY US
Patent application number | Description | Published |
---|---|---|
20080320451 | Procedure Summaries for Pointer Analysis - Pointer analysis is used for different applications, e.g., compilers, debugging tools and programs understanding tools, each having different requirements. A framework for pointer analysis is provided that defines a multidimensional space, for example a three-dimensional space, containing an order sensitivity dimension, a predicate sensitivity dimension and a value persistence dimension. A point in the three-dimensional space is identified. This point yields values for order sensitivity, predicate sensitivity and value persistence. Pointer analysis is then conducted on a computer program in accordance with the identified values for order sensitivity, predicate sensitivity and value persistence. | 12-25-2008 |
20100333167 | Adaptive Rule Loading and Session Control for Securing Network Delivered Services - Mechanisms are provided for handling client computing device requests with adaptive rule loading and session control. The mechanisms partition a set of rules, into a plurality of filter sets with each filter set having a different subset of the set of rules and being directed to identifying a different type of attack on a backend application or service. A subset of filter sets is selected to be used to validate client computing device requests received from client computing devices. The selected filter sets are applied to requests and/or responses to requests. The mechanisms dynamically modify which filter sets are included in the subset of filter sets based on an adaptive reinforcement learning operation on results of applying the selected filter sets to the requests and/or responses to requests. | 12-30-2010 |
20120304275 | HIERARCHICAL RULE DEVELOPMENT AND BINDING FOR WEB APPLICATION SERVER FIREWALL - At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model is identified. The HTTP message model includes a plurality of message model sections. Additional steps include parsing a representation of the at least one of an HTTP request message and an HTTP response message into message sections in accordance with the message model sections of the HTTP message model; and binding a plurality of security rules to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition. The given condition is based, at least in part, on a corresponding given one of the message sections. A further step includes processing the at least one of an HTTP request message and an HTTP response message in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided. | 11-29-2012 |
20130019314 | INTERACTIVE VIRTUAL PATCHING USING A WEB APPLICATION SERVER FIREWALLAANM Ji; PengAACI BeijingAACO CNAAGP Ji; Peng Beijing CNAANM Luo; LinAACI BeijingAACO CNAAGP Luo; Lin Beijing CNAANM Sreedhar; Vugranam C.AACI Yorktown HeightsAAST NYAACO USAAGP Sreedhar; Vugranam C. Yorktown Heights NY USAANM Yang; Shun XiangAACI BeijingAACO CNAAGP Yang; Shun Xiang Beijing CNAANM Zhang; YuAACI BeijingAACO CNAAGP Zhang; Yu Beijing CN - A plurality of templates for web application server firewall rules are generated. A vulnerability report for the web application is obtained. At least one web application server firewall rule is generated, using the vulnerability report and at least one of the plurality of templates. The at least one web application server firewall rule is tested. The at least one web application server firewall rule is deployed to run on the web application server firewall. | 01-17-2013 |
20130067592 | SYSTEM AND METHOD FOR ROLE BASED ANALYSIS AND ACCESS CONTROL - A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in accordance with the typestate properties. Access to operations is limited for the typestate in the program based on the role assigned to the typestate and an access permission level. | 03-14-2013 |
20130111583 | SYSTEM AND METHOD FOR HYBRID ROLE MINING | 05-02-2013 |
20130333025 | SYSTEM AND METHOD FOR ROLE BASED ANALYSIS AND ACCESS CONTROL - A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in accordance with the typestate properties. Access to operations is limited for the typestate in the program based on the role assigned to the typestate and an access permission level. | 12-12-2013 |
20140196141 | HIERARCHICAL RULE DEVELOPMENT AND BINDING FOR WEB APPLICATION SERVER FIREWALL - At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model includes a plurality of message model sections. A representation of the at least one of an HTTP request message and an HTTP response message is parsed into message sections in accordance with the message model sections of the HTTP message model. A plurality of security rules are bounds to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition, which is based, at least in part, on a corresponding given one of the message sections. The at least one of an HTTP request message and an HTTP response message is processed in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided. | 07-10-2014 |
Vugranam C. Sreedhar, White Plains, NY US
Patent application number | Description | Published |
---|---|---|
20120185825 | Method and Apparatus for Programming Software Components - A method and apparatus are disclosed for programming software components that treats software components as the basic unit of abstraction and computation. A software component is encapsulated and classes and other program entities, such as data fields and methods, within a given component do not exist beyond a component boundary. A component interacts with other components only by means of a defined set of input and output ports. A component can inherit and implement ports declared in a template and can declare and implement new ports. A component can only access the external environment through its output ports. An output port of one component can only be connected to a conforming input port of another component. A connect statement is an explicit plumbing operation for connecting components together. Interactions between components are loosely coupled. A related set of templates can be grouped together to form a group. | 07-19-2012 |
20130311971 | Method and Apparatus for Programming Software Components - Methods and systems are disclosed for programming software components that treats software components as the basic unit of abstraction and computation. A software component is encapsulated and classes and other program entities, such as data fields and methods, within a given component do not exist beyond a component boundary. A component interacts with other components only by means of a defined set of input and output ports. A component can inherit and implement ports declared in a template and can declare and implement new ports. A component can only access the external environment through its output ports. An output port of one component can only be connected to a conforming input port of another component. A connect statement is an explicit plumbing operation for connecting components together. Interactions between components are loosely coupled. A related set of templates can be grouped to form a group. | 11-21-2013 |
Vugranam Chakravarthy Sreedhar, Yorktown Heights, NY US
Patent application number | Description | Published |
---|---|---|
20080276228 | SYSTEM AND METHOD FOR STATIC ANALYSIS USING FAULT PATHS - A system and method for analyzing a program includes determining possible bug paths in a program based on statistical analysis of test cases. A static analysis is then performed only on the possible bug paths. The bugs are then located in the program. | 11-06-2008 |
20080306958 | SYSTEM AND METHOD FOR ROLE BASED ANALYSIS AND ACCESS CONTROL - A system and method for program access control includes, for a typestate, providing typestate properties and assigning a role to the typestate in a program in accordance with the typestate properties. Access to operations is limited for the typestate in the program based on the role assigned to the typestate and an access permission level. | 12-11-2008 |