Patent application number | Description | Published |
20140310396 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-16-2014 |
20140310517 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-16-2014 |
20150295805 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-15-2015 |
Patent application number | Description | Published |
20110123388 | ZIRCONIUM ALLOYS EXHIBITING REDUCED HYDROGEN ABSORPTION - An alloy according to example embodiments of the present invention may include zirconium, tin, iron, chromium, and nickel, with a majority of the alloy being zirconium. The composition of the alloy may be about 0.85-2.00% tin by weight, about 0.15-0.30% iron by weight, about 0.40-0.75% chromium by weight, and less than 0.01% nickel by weight. The alloy may further include 0.004-0.020% silicon by weight, 0.004-0.020% carbon by weight, and/or 0.05-0.20% oxygen by weight. Accordingly, the alloy exhibits reduced hydrogen absorption and improved corrosion resistance and may be used to farm a fuel assembly component. | 05-26-2011 |
20140254740 | FUEL RODS WITH WEAR-INHIBITING COATINGS AND METHODS OF MAKING THE SAME - Nuclear reactor components are treated with thermal methods to increase wear resistance. Example treatments include thermal treatments using particulate or powderized materials to form a coating. Methods can use cold spray, with low heat and high velocities to blast particles on the surface. The particles impact and mechanically deform, forming an interlocking coating with the surface and each other without melting or chemically reacting. Materials in the particles and resultant coatings include metallic alloys, ceramics, and/or metal oxides. Nuclear reactor components usable with methods of increased wear resistance include nuclear fuel rods and assemblies containing the same. Coatings may be formed on any desired surface, including fuel rod positions where spacer contact and fretting is most likely. | 09-11-2014 |
Patent application number | Description | Published |
20090022259 | FUEL ROD WITH WEAR-INHIBITING COATING - A fuel rod includes a cladding tube with a wear-inhibiting coating. In one embodiment, the coating is made of a metallic powder material that is applied to the exterior surface of the cladding tube using a thermal spray process. In an alternative embodiment, the coating is a composite made of a metallic powder material, and a ceramic powder material or a metal oxide hard phase powder material that is simultaneously applied with the metallic powder material to coat the cladding tube. The coating can be applied to selected areas of the fuel rods where debris tends to fret the fuel rod. | 01-22-2009 |
20090285350 | Multi-layer fuel channel and method of fabricating the same - A fuel channel according to example embodiments for a nuclear reactor may have an elongated and hollow body with a multi-layer structure. The multi-layer structure may include a core layer and at least one cladding layer metallurgically-bonded to the core layer. The core layer and the at least one cladding layer may be alloys having different compositions. For instance, the core layer may be significantly more resistant to irradiation growth and/or irradiation creep than the at least one cladding layer, and the at least one cladding layer may have an increased resistance to hydrogen absorption and/or corrosion relative to the core layer. Accordingly, the distortion of the fuel channel may be reduced or prevented, thus reducing or preventing the interference with the movement of the control blade. | 11-19-2009 |
20100091934 | FUEL ROD ASSEMBLY AND METHOD FOR MITIGATING THE RADIATION-ENHANCED CORROSION OF A ZIRCONIUM-BASED COMPONENT - There is provided a fuel rod assembly comprising a first component of a zirconium-based material. The first component is in contact with or is located adjacent to a second component of a material different from the zirconium-based material, e.g. a nickel-based or iron-based alloy. A coating is disposed on an outer surface of the first component, which is effective to reduce an electrochemical corrosion potential difference between the first component and the second component relative to an electrochemical corrosion potential difference between the first component and the second component without the coating. | 04-15-2010 |
20140334592 | FUEL ROD ASSEMBLY AND METHOD FOR MITIGATING THE RADIATION-ENHANCED CORROSION OF A ZIRCONIUM-BASED COMPONENT - There is provided a fuel rod assembly comprising a first component of a zirconium-based material. The first component is in contact with or is located adjacent to a second component of a material different from the zirconium-based material, e.g. a nickel-based or iron-based alloy. A coating is disposed on an outer surface of the first component, which is effective to reduce an electrochemical corrosion potential difference between the first component and the second component relative to an electrochemical corrosion potential difference between the first component and the second component without the coating. | 11-13-2014 |
20160005499 | METHODS OF COATING A NUCLEAR REACTOR COMPONENT WITH A COLLOIDAL SOLUTION - A method of coating a nuclear reactor component includes introducing the nuclear reactor component into a colloidal solution at a first rate to obtain an immersed component. The colloidal solution is a non-crosslinked mixture including a dispersed phase within a dispersion medium. The dispersed phase may include n-type metal oxide particles. The method additionally includes removing the immersed component from the colloidal solution at a second rate to obtain a wet component. The method also includes drying the wet component to obtain a dried component. The method further includes baking the dried component to obtain a coated component. Accordingly, the nuclear reactor component is provided with a protective layer that reduces or prevents the occurrence of corrosion. | 01-07-2016 |
Patent application number | Description | Published |
20150101606 | DEVICES FOR VAPORIZING AND DELIVERING AN AEROSOL AGENT - A device for vaporizing and delivering an aerosol agent includes a heat generator, a heat conductor in fluid (airflow) communication with the heat generator, and a substrate holder in heat conducting relation with the heat conductor. The heat generator is a handheld, portable torch and the heat conductor defines an annular heat conducting chamber surrounding a substrate disposed within the substrate holder that supports the aerosol agent and an aerosol forming agent. Another device is a handheld, battery-powered heat generator including a heating element in heat conducting relation with a substrate holder. The heating element is a nichrome heating coil wound about the substrate disposed within the substrate holder and electrically coupled to the battery. Another device further includes an auxiliary heat generator having an auxiliary heating element formed by a finely woven wire mesh positioned adjacent the substrate and electrically coupled to the battery. | 04-16-2015 |
20150209530 | SUBSTRATES FOR VAPORIZING AND DELIVERING AN AEROSOL AGENT - Substrates configured for use with an aerosol agent delivery device to vaporize and deliver an aerosol agent to a user include a carrier and a paste applied to the carrier. The carrier is formed from a non-combustible, thermally conductive, non-toxic and non-off gassing material, such as glass, ceramic or metal. The carrier may be formed in the shape of a solid or porous disc, cupped disc, cylinder or spiral cylinder and the paste may be applied to at least one surface of the carrier. The paste composition may include a binder material, an aerosol agent, such as a therapeutic drug or nicotine, an aerosol forming agent, and an inorganic, inert filler material. The aerosol agent may be derived from an organic plant material, such as ground tobacco, coffee, tea or the like. The aerosol agent may also be provided as a liquid additive, such as liquid nicotine and tobacco flavor. | 07-30-2015 |
20150359259 | SEGMENTED SMOKING ARTICLE WITH SUBSTRATE CAVITY - A cigarette includes lighting and mouth ends. It may include a smokable segment disposed at the lighting end. It also includes a mouth-end segment; an aerosol-generation system disposed between the lighting and mouth ends, which includes (i) a heat-generation segment adjacent the smokable segment, including a heat source and an insulation layer and (ii) an aerosol-generating segment including a substrate, which may include tobacco pellets and aerosol-forming material disposed in a substrate cavity between the heat generation segment and the mouth end; a piece of outer wrapping material that provides an overwrap around at least a portion of the aerosol-generating segment, the heat-generation segment, and at least a portion of the smokable segment and includes a foil strip laminated thereon; those segments being connected together by the overwrap to provide a cigarette rod; that is connected to the mouth-end segment using tipping material. | 12-17-2015 |
Patent application number | Description | Published |
20150110078 | Techniques for Establishing a Communication Handoff Threshold Using User Feedback - Examples are disclosed for acquiring user feedback and implementing statistical modeling techniques to enable a handoff profile for a dual-mode hybrid mobile device. In some examples communication link handoff logic may be executed by the processor component to receive user feedback during a voice call mediated by a call server, the voice call between a hybrid mobile device and another communication device, the user feedback pertaining to one or more Voice-over Internet Protocol (VoIP) communication link parameters for the communication link between the hybrid mobile device and the call server. The VoIP communication link parameters are statistically modeled based on the user feedback and a handoff profile is established for the hybrid mobile devices, the handoff profile operative to establish criteria for switching the VoIP communication link to an alternate communication link. | 04-23-2015 |
20150110080 | Techniques for Establishing a Communication Handoff Threshold Using User Feedback - Examples are disclosed for acquiring real-time VoIP data and implementing statistical modeling techniques to perform a handoff between different telecommunication networks for a hybrid mobile device. In some examples communication link handoff logic may be executed by the processor component to receive VoIP data during a voice call mediated by a call server, the voice call between a hybrid mobile device and another communication device, the data pertaining to one or more Voice-over Internet Protocol (VoIP) communication link parameters for the communication link between the hybrid mobile device and the call server. The VoIP communication link parameters are statistically modeled and compared to a handoff profile operative to establish criteria for switching the VoIP communication link to an alternate communication link. | 04-23-2015 |
20150110081 | Techniques for Establishing a Communication Handoff Threshold Using User Feedback - Examples are disclosed for acquiring real-time VoIP data and implementing statistical modeling techniques to perform a handoff between different telecommunication networks for a hybrid mobile device. In some examples communication link handoff logic may be executed by the processor component to receive VoIP data during a voice call mediated by a call server, the voice call between a hybrid mobile device and another communication device, the data pertaining to one or more Voice-over Internet Protocol (VoIP) communication link parameters for the communication link between the hybrid mobile device and the call server. The VoIP communication link parameters are statistically modeled and compared to a handoff profile operative to establish criteria for switching the VoIP communication link to an alternate communication link. | 04-23-2015 |
20150189559 | Techniques for Establishing and Executing Handoff Profile Between Telecommunications Networks - Examples are disclosed for acquiring user feedback and implementing logistic regression statistical modeling techniques to enable a handoff profile for a dual-mode hybrid mobile device. In some examples communication link handoff logic may be executed by the processor component to receive user feedback during a voice call mediated by a call server, the voice call between a hybrid mobile device and another communication device, the user feedback pertaining to one or more Voice-over Internet Protocol (VoIP) communication link parameters for the communication link between the hybrid mobile device and the call server. The VoIP communication link parameters are statistically modeled based on the user feedback and a handoff profile is established for the hybrid mobile devices, the handoff profile operative to establish criteria for switching the VoIP communication link to an alternate communication link. | 07-02-2015 |
20150237537 | TECHNIQUES FOR EXECUTING A HANDOFF PROFILE BETWEEN TELECOMMUNICATIONS NETWORKS - Examples are disclosed for executing a handoff profile for a mobile device. Communication link handoff logic may be executed by a processor to detect an 802.11 network access point and register the mobile device with a call server over the 802.11 network access point. Thereafter, a first timer may be initiated for a specified duration wherein the registration between the mobile device and the call server over the 802.11 network access point is maintained without interruption for the duration of the first timer. Upon successful expiration of the first timer, a second timer may be initiated for a specified duration wherein VoIP communication link parameters for the 802.11 link between the mobile device and the call server are deemed sufficient for the entire duration of the second timer. Upon successful expiration of the second timer, a handoff may be performed between the mobile device and the call server from the cellular communication link to the 802.11 link. | 08-20-2015 |
20150237552 | TECHNIQUES FOR EXECUTING A HANDOFF PROFILE BETWEEN TELECOMMUNICATIONS NETWORKS - Examples are disclosed for executing a handoff profile for a hybrid mobile device. Communication link handoff logic may be executed by a processor component to detect an 802.11 network access point while in a communication session between a mobile device and a call server over a cellular communication link. The mobile device may register with the call server over the 802.11 network access point and establish a Voice-over Internet Protocol (VoIP) communication link between the mobile device and the call server. A test Real-time Transport Protocol (RTP) stream over the VoIP communication link between the mobile device and the call server may then be established. Data for discrete time intervals of the test RTP stream may be received, the data for each time interval comprising a plurality of VoIP communication link parameter values and fit to a statistical. The statistical model may be associated with a plurality of outcomes based on the VoIP communication link parameter values, the VoIP quality outcomes being either acceptable VoIP audio quality or poor VoIP audio quality. The communication session may then be handed off from the cellular communication link to the VoIP communication link when the outcome of the application of the statistical model to the received data is acceptable VoIP audio quality. | 08-20-2015 |
20160044568 | Techniques for Determining a Handoff Profile Between Telecommunications Networks - Techniques are disclosed for evaluating an ongoing VoIP over WiFi call for purposes of determining when to hand it off to a circuit-switched cellular network connection. 802.11 WiFi call quality values X(i) over a sampled time period (N) of (j) samples for an ongoing telephone call over an 802.11 WiFi communication link are obtained and stored. An instantaneous annoyance value a(j) for each of the stored call quality values X(j) within sampled time period (N) is calculated. A current accumulated annoyance value A(i) by summing the instantaneous annoyance values a(j) is also calculated. The accumulated annoyance value A(i) is compared to a handoff threshold value H(i). A handoff of the telephone call from the 802.11 WiFi communication link to a circuit-switched cellular communication link is initiated when the accumulated annoyance value A(i) is greater than the handoff threshold value H(i). | 02-11-2016 |
20160057676 | Techniques for Determining a Handoff Profile Between Telecommunications Networks - Techniques are disclosed for evaluating an ongoing VoIP call over a combination of IP data communication network connections for purposes of determining when to hand it off to a circuit-switched cellular network connection. Multiple IP stream call quality values X1(i), X2(i), and Xb(i) are sampled over a time period (N) of (j) samples for an ongoing telephone call and stored. Instantaneous annoyance values a1(j), a2(j), and ab(j) for each of the stored call quality values for each of the IP streams within sampled time period (N) are calculated. Current accumulated annoyance values A1(i), A2(i), and Ab(i) are obtained by summing the instantaneous annoyance values a(j) for each IP network. The combined IP stream accumulated annoyance values Ab(i) is compared to a handoff threshold values Hb(i). A handoff of the telephone call a circuit-switched cellular communication link is initiated when the accumulated annoyance value Ab(i) is greater than the handoff threshold value Hb(i). | 02-25-2016 |
Patent application number | Description | Published |
20100307061 | TRACK FOR AN ADJUSTABLE BLIND ASSEMBLY - A track for an adjustable blind assembly is disclosed. One described track for an adjustable blind assembly comprises a track comprising a base and a slot, the base comprising a flange portion and a brace portion, the flange portion extending from the base and securable to a spaced window pane by a window frame, and the slot extending from the base and comprising a channel for a sliding adjuster. | 12-09-2010 |
20110138715 | MOLDED FIBERGLASS SIDELITE ASSEMBLY - A sidelite assembly including first and second panels with an opening for receiving a window or glazing is provided. The first and second panels include inner and out edge portions with ridges and/or channels that allow for the alignment and attachment of the first and second panels to one another. | 06-16-2011 |
20120159879 | MOLDED FIBERGLASS SIDELITE ASSEMBLY - The present relates to a sidelite assembly having first and second panels and a window. Each of the panels has an inner edge extending outwardly from a major planar portion and surrounding an opening. The inner edge includes a first portion having a ridge extending outwardly from a distal end thereof and a second portion having a channel extending inwardly from the distal end. An outer edge extends outwardly from the major planar portion and adjacent a periphery thereof, and includes a first portion having a ridge extending outwardly from a distal end thereof and a second portion having a channel extending inwardly from the distal end. The ridges of the first panel are aligned with and received in the channels of the second panel. The window is disposed within the opening. | 06-28-2012 |
20130067823 | MOLDED FIBERGLASS SIDELITE ASSEMBLY - The present relates to a sidelite assembly having first and second panels and a window. Each of the panels has an inner edge extending outwardly from a major planar portion and surrounding an opening. The inner edge includes a first portion having a ridge extending outwardly from a distal end thereof and a second portion having a channel extending inwardly from the distal end. An outer edge extends outwardly from the major planar portion and adjacent a periphery thereof, and includes a first portion having a ridge extending outwardly from a distal end thereof and a second portion having a channel extending inwardly from the distal end. The ridges of the first panel are aligned with and received in the channels of the second panel. The window is disposed within the opening. | 03-21-2013 |
20130199740 | TRACK FOR AN ADJUSTABLE BLIND ASSEMBLY - A track for an adjustable blind assembly is disclosed. One described track for an adjustable blind assembly comprises a track comprising a base and a slot, the base comprising a flange portion and a brace portion, the flange portion extending from the base and securable to a spaced window pane by a window frame, and the slot extending from the base and comprising a channel for a sliding adjuster. | 08-08-2013 |
20130312335 | MOLDED FIBERGLASS SIDELITE ASSEMBLY - The present relates to a sidelite assembly having first and second panels and a window. Each of the panels has an inner edge extending outwardly from a major planar portion and surrounding an opening. The inner edge includes a first portion having a ridge extending outwardly from a distal end thereof and a second portion having a channel extending inwardly from the distal end. An outer edge extends outwardly from the major planar portion and adjacent a periphery thereof, and includes a first portion having a ridge extending outwardly from a distal end thereof and a second portion having a channel extending inwardly from the distal end. The ridges of the first panel are aligned with and received in the channels of the second panel. The window is disposed within the opening. | 11-28-2013 |
20140359971 | TRACK FOR AN ADJUSTABLE BLIND ASSEMBLY - A track for an adjustable blind assembly is disclosed. One described track for an adjustable blind assembly comprises a track comprising a base and a slot, the base comprising a flange portion and a brace portion, the flange portion extending from the base and securable to a spaced window pane by a window frame, and the slot extending from the base and comprising a channel for a sliding adjuster. | 12-11-2014 |
Patent application number | Description | Published |
20090165405 | COMPOSITE CAPPED STILE, DOOR AND METHOD - The present invention relates to a capped stile for an entry door having an interior backer element and an exterior cap element secured thereto. The exterior cap element is formed from a moisture resistant, foamed polymer composite and has a specific gravity of about 0.9 or less. A door having the disclosed capped stile, and a method of forming a door, are also disclosed. | 07-02-2009 |
20090235611 | ONE-PIECE INJECTION MOLDED DOOR SILL ASSEMBLY - A sill assembly includes an integral sill assembly having a sill base and an inclined threshold. The sill base is overmolded in an injection molding process onto the inclined threshold. A rail assembly is adjustably secured to the sill base. | 09-24-2009 |
20100307079 | ONE-PIECE INJECTION MOLDED DOOR SILL ASSEMBLY - A sill assembly includes an integral sill assembly having a sill base and an inclined threshold. The sill base is overmolded in an injection molding process onto the inclined threshold. A rail assembly is adjustably secured to the sill base. | 12-09-2010 |
20160097234 | COMPOSITE CAPPED STILE, DOOR AND METHOD - The present invention relates to a capped stile for an entry door having an interior backer element and an exterior cap element secured thereto. The exterior cap element is formed from a moisture resistant, foamed polymer composite and has a specific gravity of about 0.9 or less. A door having the disclosed capped stile, and a method of forming a door, are also disclosed. | 04-07-2016 |
Patent application number | Description | Published |
20090116496 | SYNCHRONIZING PORTIONS OF A DATABASE WITH DIFFERENT DATABASES ON DIFFERENT NODES OF A NETWORK - Techniques are disclosed for synchronizing a database related to a first node in a network with multiple nodes. Each node includes a database different from a database on a different node. An inquiry control message is sent to each node in a candidate set of one or more nodes on the network, which are different from the first node. In response to the inquiry control message, the first node receives a first set of one or more messages from a particular node different from the first node. The first set indicates a portion from the database of the particular node. The portion is relevant for the first node. A particular portion of a first database for the first node is derived from the first set of messages. The particular portion is less than all of the first database. These techniques allow the first node to derive its full database from multiple adjacent nodes. | 05-07-2009 |
20090238076 | METHOD AND APPARATUS TO ENABLE AN IPe DOMAIN THROUGH EIGRP - In one embodiment, a system, method, and apparatus for preventing excessive transmission of routing information in a communications network occurs by receiving a network routing address at a connection node in a communications network, the network routing address allowing the transmission of data packets from a source node to a destination node in the communications network; determining a longest summary route covering a path to the destination node; creating a list comprising a summary of all neighbor connection nodes of the connection node; and transmitting an update of the longest summary route of the network routing address towards all neighbor nodes advertising a destination address comprising a shorter address prefix, wherein the transmitting process occurs sequentially beginning with a first neighbor connection node entered in the list. | 09-24-2009 |
20100329270 | DYNAMIC DISCOVERY MECHANISMS VIA INTER-DOMAIN ROUTING PROTOCOL - In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and additionally, a mesh group identifier identifying a mesh group is identified. The logical identifier and the mesh group identifier are encoded in a routing message, which is used in an inter-domain routing protocol, and this routing message is transmitted to a reflector device in communication with the device. The reflector device is configured to transmit the routing message to a remote device included in the computer network. | 12-30-2010 |
20110019671 | Partitioned Forwarding of Packets Originated on a Broadcast Link Among Layer 2 Forwarding Devices of Different Adjacency Networks - The designated forwarding device functionality for forwarding of packets originated on a broadcast link among layer 2 is shared among multiple forwarding devices of different adjacency networks. As these networks do not form adjacencies, the forwarding devices do not natively participate in a same spanning tree for determining how to forward packets, and a designated forwarding device is used for forwarding packets originated on the common broadcast link. Distributing the role of a designated forwarding device among multiple of the forwarding devices provides a means for more efficiently forwarding packets to their destinations. | 01-27-2011 |
20120106395 | DETERMINING A ROUTE ADVERTISEMENT IN A REACTIVE ROUTING ENVIRONMENT - In an example embodiment, a method and system is provided to determine and advertise a route advertisement in a reactive routing environment. In response to receiving a network address query with respect to a destination address at a routing device, an aggregate value, e,g, an address prefix, is determined and advertised in reply to the network address query. Determining of the aggregate value may comprise identifying within a range of network addresses represented by the aggregate value respective addresses for which the routing device does not have reachability information. The routing device may send address queries with respect to the identified addresses, to determine reachability via the routing device of those addresses. The aggregate value may be advertised conditional upon determining that a percentage of addresses within the corresponding range that can be reached via the routing device satisfies a predefined minimal coverage value. | 05-03-2012 |
20120134368 | DYNAMIC DISCOVERY MECHANISMS VIA INTER-DOMAIN ROUTING PROTOCOL - In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and additionally, a mesh group identifier identifying a mesh group is identified. The logical identifier and the mesh group identifier are encoded in a routing message, which is used in an inter-domain routing protocol, and this routing message is transmitted to a reflector device in communication with the device. The reflector device is configured to transmit the routing message to a remote device included in the computer network. | 05-31-2012 |
20120195205 | Network Topologies for Energy Efficient Networks - One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active set; and tests each combination in order of each combination's total-energy value to determine whether a specific combination is able to complete the active set; if no combination is able to complete the active set, then including all one-hop neighbor nodes in the active set; and communicates a message to each one-hop neighbor node in the active set indicating that it is in the active set. | 08-02-2012 |
20120198092 | Network Topologies for Energy Efficient Networks - One embodiment receives at a first node in at least a portion of a network a routing table, the portion of the network comprising the first node and one or more second nodes, the routing table specifying the immediate neighbor that provides each of the best paths in the portion of the network based on a total cost; using the routing table, determines at the first node every second node that is necessary for the first node to reach all edges of the network, the second nodes that are necessary for the first node to reach all edges of the network comprising an active set for the first node; and sends a message from the first node to every second node to facilitate determining whether to shut down the second node. | 08-02-2012 |
20120331555 | Performing A Defensive Procedure In Response To Certain Path Advertisements - In certain embodiments, performing a defensive procedure involves receiving at a first speaker of a first autonomous system a path advertisement from a second speaker of a second autonomous system. The path advertisement advertises a path from the second speaker of the second autonomous system. It is determined whether the second autonomous system is a stub autonomous system and whether a path length of the path is greater than one. If the second autonomous system is a stub and the path length is greater than one, a defensive measure is performed for the path. Otherwise, a default procedure is performed for the path. | 12-27-2012 |
20140211662 | Network Topologies for Energy Efficient Networks - One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node, comprising: includes in the active set each one-hop neighbor node that is either an edge node or connected with at least one two-hop neighbor node with which no other one-hop neighbor nodes are connected; and if the active set is not yet complete, then: determine all combinations of one-hop neighbor nodes that are not already in the active set; and tests each combination in order of each combination's total-energy value to determine whether a specific combination is able to complete the active set; if no combination is able to complete the active set, then including all one-hop neighbor nodes in the active set; and communicates a message to each one-hop neighbor node in the active set indicating that it is in the active set. | 07-31-2014 |
20140269734 | DETERMINING A ROUTE ADVERTISEMENT IN A REACTIVE ROUTING ENVIRONMENT - In an example embodiment, a method and system is provided to determine and advertise a route advertisement in a reactive routing environment. In response to receiving a network address query with respect to a destination address at a routing device, an aggregate value, e.g. an address prefix, is determined and advertised in reply to the network address query. Determining of the aggregate value may comprise identifying within a range of network addresses represented by the aggregate value respective addresses for which the routing device does not have reachability information. The routing device may send address queries with respect to the identified addresses, to determine reachability via the routing device of those addresses. The aggregate value may be advertised conditional upon determining that a percentage of addresses within the corresponding range that can be reached via the routing device satisfies a predefined minimal coverage value. | 09-18-2014 |
Patent application number | Description | Published |
20080212494 | Ad hoc network formation and mangement based on aggregation of ad hoc nodes according to an aggregation hierarchy - Each mobile ad hoc node has an assigned hierarchy position within an identified tree-based aggregation group. Each ad hoc node is configured for selectively attaching to one of a plurality of available ad hoc nodes based on identifying a best match, for the assigned hierarchy position within the identified aggregation group, from among identifiable hierarchy positions of identifiable aggregation groups. Each ad hoc node also is configured for selectively attaching to any available ad hoc node based on a determined absence of any available ad hoc node advertising the identified aggregation group of the ad hoc node, or an aggregation group containing the identified aggregation group. Hence, a root node of an aggregation group can filter group-specific routing information from packets destined toward a network clusterhead, resulting in a scalable routing protocol that is not adversely affected by added nodes. | 09-04-2008 |
20090041037 | Border Router with Selective Filtering of Link State Advertisements - An example embodiment of the present invention provides a process relating to the selective filtering of an LSA at a not-so-stubby-sub-area (NSSSA) border router. In one embodiment, the border router receives an LSA from another router inside the NSSSA, which might be in the access layer of the hierarchical network design model and which might use OSPF as its IGP. If the LSA is Type 1 and includes a subnet route or forwarder address, the border router floods it to its neighboring routers, regardless of whether they are inside the NSSSA. If the LSA is Type 7 and includes a host address, the border router floods it to a neighboring router if the neighboring router is inside the NSSSA, but filters the LSA if the neighboring router is outside the NSSSA, for example, in an OSPF area in the distribution layer of the hierarchical network design model. | 02-12-2009 |
Patent application number | Description | Published |
20120172100 | Virtual Lesson Plan Integration - A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determine whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student. | 07-05-2012 |
20130086128 | BUSINESS CONTENT HIERARCHY - A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy. | 04-04-2013 |
20130254275 | DYNAMIC MESSAGE RETRIEVAL - Methods and systems for dynamically changing a message retrieval scheme during runtime include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme. | 09-26-2013 |
20130254318 | DYNAMIC MESSAGE RETRIEVAL - Exemplary embodiments provide methods and systems for dynamically changing a message retrieval scheme during runtime. Aspects of the exemplary embodiment include accessing messaging business rules from a memory by a message retrieval component at runtime, wherein the messaging business rules define a primary retrieval scheme and a secondary retrieval scheme, and wherein a value provided for each of the primary retrieval scheme and the secondary retrieval scheme are selected from a combination of different message retrieval types including: First In First Out (FIFO), Last In First Out (LIFO), and random. The message retrieval component subdivides the message queue into sub-queues based on at least one of a message quantity limit and a message received time limit specified in the business rules. Each of the sub-queues is then accessed using the value of the secondary retrieval scheme; and messages from each of the sub-queues are retrieved using the value of the primary retrieval scheme. | 09-26-2013 |
20140101324 | DYNAMIC VIRTUAL PRIVATE NETWORK - Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information. | 04-10-2014 |
20140101325 | DYNAMIC VIRTUAL PRIVATE NETWORK - Various embodiments establish a virtual private network (VPN) between a remote network and a private network. In one embodiment, a first system in the remote network establishes a connection with a central system through a public network. The central system is situated between the first system and a second system in the private network. The first system receives, from the central system and based on establishing the connection, a set of VPN information associated with at least the second system. The first system disconnects from the central system and establishes a VPN directly with the second system through the public network based on the set of VPN information. | 04-10-2014 |
20140178852 | Virtual Lesson Plan Integration - A student personal computer (PC) presents educational questions at break points in a video game. It receives an identifier of a student. It receives a selection by the student of one of a plurality of video games, each of the video games including break points. It correlates the identifier of the student to a corresponding set of educational questions from a plurality of sets of educational questions. It begins execution of the video game. It, responsive to occurrence of a break point, interrupts the execution of the video game and render to the student playing the video game a question of the corresponding set of educational questions. It receives from the student an answer to the educational question of the corresponding set and determines whether the answer is correct. The student PC continues execution of the video game after receiving the answer from the student. | 06-26-2014 |
20150248477 | BUSINESS CONTENT HIERARCHY - A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy. | 09-03-2015 |
Patent application number | Description | Published |
20090075271 | Methods of identifying individuals at risk of perioperative bleeding, renal dysfunction or stroke - The present invention relates, in general, to perioperative bleeding and, in particular, to methods of identifying individuals at risk of perioperative bleeding. | 03-19-2009 |
20090155792 | PREDICTORS OF LONG-TERM MORTALITY FOLLOWING CORONARY ARTERY BYPASS GRAFT SURGERY - The present invention relates, in general, to perioperative depression and, in particular, to methods of identifying individuals at risk of perioperative depression. | 06-18-2009 |
20100047775 | Method of identifying individuals at risk of perioperative myocardial injury, major adverse cardiac events, cognitive decline, arrhythmias, depression or bleeding - The present invention relates to methods of identifying individuals at risk of perioperative myocardial injury, major adverse cardiac events, cognitive decline, arrhythmias, depression and bleeding. | 02-25-2010 |
20120322667 | METHODS OF IDENTIFYING INDIVIDUALS AT RISK OF PERIOPERATIVE BLEEDING, RENAL DYSFUNCTION OR STROKE - The present invention relates, in general, to perioperative bleeding and, in particular, to methods of identifying individuals at risk of perioperative bleeding. | 12-20-2012 |
20140141429 | METHODS OF IDENTIFYING INDIVIDUALS AT RISK OF PERIOPERATIVE BLEEDING, RENAL DYSFUNCTION OR STROKE - The present invention relates, in general, to perioperative bleeding and, in particular, to methods of identifying individuals at risk of perioperative bleeding. | 05-22-2014 |