Tiwari, CA
Abhishek Tiwari, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120066355 | Method and Apparatus to Provide an Ecosystem for Mobile Video - A method or apparatus to provide a video ecosystem is described. The video ecosystem, in one embodiment, permits live video streaming between users on different platforms, carriers, and/or devices. | 03-15-2012 |
Anchal Tiwari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150352605 | Washer device for breast pump accessories - A washing device for washing breast pump accessories and baby bottles, by spraying water in jets of high pressure, includes a washing enclosure; a water inlet; a drain outlet; a tube network; a wash pump; a heating element; a tray; a top sliding mesh lid; a breast shield clamp, including a clip, a clamp base, and extender arm, and adjustable side arms; a distribution valve; a plurality of water dispensing components, including spray pipes, a top spinner, a bottom spinner, side spinners, side nozzles. Spray pipes can be height adjustable, and can include spray nozzles, which can be flexible or rotating. Side nozzles can be adjustable or rotating. The washing device can further include a steam generator or an ultraviolet sterilizer lamp for sterilizing contents placed in the tray. | 12-10-2015 |
Gunjan Tiwari, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20080242561 | MASSIVELY PARALLEL SYNTHESIS OF BIOPOLYMERIC ARRAYS - Methods for fabricating dense arrays of polymeric molecules in a highly multiplexed manner are provided using semiconductor-processing-derived lithographic methods. Advantageously, the methods are adaptable to the synthesis of a variety of polymeric compounds. For example, arrays of branched peptides and polymers joined by peptide bonds may be fabricated in a highly multiplexed manner. | 10-02-2008 |
20080318808 | MASSIVELY PARALLEL SYNTHESIS OF BIOPOLYMERIC ARRAYS - Methods for fabricating dense arrays of polymeric molecules in a highly multiplexed manner are provided using semiconductor-processing-derived lithographic methods. Advantageously, the methods are adaptable to the synthesis of a variety of polymeric compounds. For example, arrays of branched peptides and polymers joined by peptide bonds may be fabricated in a highly multiplexed manner. | 12-25-2008 |
20090258796 | MASSIVELY PARALLEL SYNTHESIS OF BIOPOLYMERIC ARRAYS - Methods for fabricating dense arrays of polymeric molecules in a highly multiplexed manner are provided using semiconductor-processing-derived lithographic methods. Advantageously, the methods are adaptable to the synthesis of a variety of polymeric compounds. For example, arrays of branched peptides and polymers joined by peptide bonds may be fabricated in a highly multiplexed manner. | 10-15-2009 |
20100240555 | Method for high throughput, high volume manufacturing of biomolecule micro arrays - The embodiments of the invention relate to a system and method for making a biomolecule microarray comprising a spacer attachment module adapted to attach a linker to a substrate surface of the biomolecule microarray, a coupling module adapted to couple a molecule to the linker, the molecule being capable of forming a peptide bond and containing a protecting group that prevents the formation of the peptide bond, and a deprotection module adapted to create deprotection of the protecting group with a radiation exposure of about 1-50 mJ/cm | 09-23-2010 |
20100248975 | Fluorogenic peptide substrate arrays for highly multiplexed, real-time monitoring of kinase activities - The embodiments of the invention relate to a biomolecule microarray comprising a plurality of different polypeptides, where the polypeptides contain a kinase recognition sequence connected via a linker sequence to a metal binding amino acid that undergoes chelation enhanced fluorescence upon binding to a divalent cation. The embodiments further relate to kits comprising the microarray, and methods of using the microarray to screen for kinase activity, and to screen for inhibitors of kinase activity. | 09-30-2010 |
Gunjan Tiwari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090325817 | Polymer co-location in surface-attached biopolymers and arrays of biopolymers - Embodiments of the present invention provide substrates having controllably co-located polymers of different sequences. Methods are provided that allow the fabrication of arrays of polymers on a substrate having controllably co-located polymers in regions of the array. For example, polymers of nucleic acids and peptides having different sequences and or compositions can be co-located within a region of a substrate. Also provided are arrays of DNA polymers wherein polymers having two different sequences are co-located within a region of an array. The co-located DNA polymers can comprise complementary DNA that is able to hybridize and form double stranded DNA. Arrays having regions comprising double stranded DNA are provided. | 12-31-2009 |
20140213484 | POLYMER CO-LOCATION IN SURFACE-ATTACHED BIOPOLYMERS AND ARRAYS OF BIOPOLYMERS - Embodiments of the present invention provide substrates having controllably co-located polymers of different sequences. Methods are provided that allow the fabrication of arrays of polymers on a substrate having controllably co-located polymers in regions of the array. For example, polymers of nucleic acids and peptides having different sequences and or compositions can be co-located within a region of a substrate. Also provided are arrays of DNA polymers wherein polymers having two different sequences are co-located within a region of an array. The co-located DNA polymers can comprise complementary DNA that is able to hybridize and form double stranded DNA. Arrays having regions comprising double stranded DNA are provided. | 07-31-2014 |
Kamal Tiwari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150032843 | RESOURCE LOCATOR REMARKETING - Methods, systems, and apparatus for resource locator remarketing are presented. In one aspect, a method includes receiving visitation data from a publisher, the visitation data specifying a device identifier and a resource locator specifying a resource that was provided to a user device; identifying a content feed that includes regular expressions, each regular expression specifying matching character strings and a set of content items that are eligible to be provided to user devices corresponding to visitation data including a resource locator matching one of the regular expressions; identifying, a first matching regular expression that matches the resource locator specified by the visitation data; selecting a content item from the content items that correspond to the first matching regular expression; and providing data that causes presentation of the selected content item to the user device. | 01-29-2015 |
20150032849 | RESOURCE LOCATOR REMARKETING - Methods, systems, and apparatus for resource locator remarketing are presented. In one aspect, a method includes receiving visitation data from a publisher, the visitation data specifying a device identifier and a resource locator specifying a resource that was provided to a user device; identifying a content feed that includes regular expressions, each regular expression specifying matching character strings and a set of content items that are eligible to be provided to user devices corresponding to visitation data including a resource locator matching one of the regular expressions; identifying, a first matching regular expression that matches the resource locator specified by the visitation data; selecting a content item from the content items that correspond to the first matching regular expression; and providing data that causes presentation of the selected content item to the user device. | 01-29-2015 |
20150227637 | RESOURCE LOCATOR REMARKETING - Methods, systems, and apparatus for resource locator remarketing are presented. In one aspect, a method includes receiving visitation data from a publisher, the visitation data specifying a device identifier and a resource locator specifying a resource that was provided to a user device; identifying a content feed that includes regular expressions, each regular expression specifying matching character strings and a set of content items that are eligible to be provided to user devices corresponding to visitation data including a resource locator matching one of the regular expressions; identifying, a first matching regular expression that matches the resource locator specified by the visitation data; selecting a content item from the content items that correspond to the first matching regular expression; and providing data that causes presentation of the selected content item to the user device. | 08-13-2015 |
Krishna K. Tiwari, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150356671 | SYSTEM, METHOD, AND APPARATUS FOR AUTOMATED COST OF SALE BIDDING - The present disclosure is directed to apparatuses, systems, and methods for automatically managing cost of sale (COS) bidding for merchants (alternatively referred to herein as “vendors”). Described herein are automated COS bidding processes (or automated COS bidding logic, modules, or engines) utilized such that merchants need not actively manage their bids (i.e., fees associated with displaying item listings). As described herein, embodiments automate merchant bids using a formula based, at least in part, on the price of the item, the cost of selling from the advertiser, and historical performance data. | 12-10-2015 |
Manish Tiwari, Dublin, CA US
Patent application number | Description | Published |
---|---|---|
20090257437 | IDENTITY-BASED NETWORKING - A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling. | 10-15-2009 |
20110128858 | SYSTEM AND NETWORK FOR WIRELESS NETWORK MONITORING - A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point. | 06-02-2011 |
Manish Tiwari, Pleasanton, CA US
Patent application number | Description | Published |
---|---|---|
20120140705 | SYSTEM AND NETWORK FOR WIRELESS NETWORK MONITORING - A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point. | 06-07-2012 |
Manoj Tiwari, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20110242994 | FLOW SAMPLING WITH TOP TALKERS - An improved network flow sampling apparatus and corresponding method more intelligently selects flows to be reported beyond random flow or packet sampling intervals. Evaluation of flows selects top talkers or heavy hitters as important flows that most impact traffic and therefore should be reported. Top talkers are flows defined based on a customized definition according to, for example, number of packets in a flow, number of bytes in a flow, or bandwidth consumed by a flow. An external collector can thus proceed with traffic profiling or other flow monitoring purposes with a more intelligently determined network flow sample. | 10-06-2011 |
Manoj Kumar Tiwari, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100188976 | Dynamic Management of Network Flows - A plurality of flow network elements monitors network flows at the subscriber level for a plurality of subscribers. The flow network elements export flow records to a collector, which organizes the flow records. A policy client correlates the flow records and determines whether any network flows are violating a flow policy definition. If a flow policy definition is violated, the policy client transmits a policy action to a policy server which indicates what action to take for a given violating flow. The policy server assigns a flow policy for the subscriber corresponding with the violating flow. The assigned flow policy is then transmitted to the flow network element having that violating flow, and that flow network element installs the flow policy. | 07-29-2010 |
20130021906 | Dynamic Management of Network Flows - A plurality of flow network elements monitors network flows at the subscriber level for a plurality of subscribers. The flow network elements export flow records to a collector, which organizes the flow records. A policy client correlates the flow records and determines whether any network flows are violating a flow policy definition. If a flow policy definition is violated, the policy client transmits a policy action to a policy server which indicates what action to take for a given violating flow. The policy server assigns a flow policy for the subscriber corresponding with the violating flow. The assigned flow policy is then transmitted to the flow network element having that violating flow, and that flow network element installs the flow policy. | 01-24-2013 |
Mitul Tiwari, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20140304202 | CONNECTION INVITATION ORDERING - Disclosed in some examples are methods, systems, and machine-readable mediums which provide a relevance engine for determining a relevance of an individual (either a non-member or another member) to another individual (either a non-member or another member). This relevance engine may use signals in the form of data that the social networking service may learn about the individuals to determine how relevant the individuals are to each other. Example applications may include ordering of connection invitations in a social networking service. | 10-09-2014 |
20150046539 | TECHNIQUES TO FACILITATE RECOMMENDATIONS FOR NON-MEMBER CONNECTIONS - Disclosed in some examples are methods, systems, and machine-readable mediums which provide a relevance engine for determining a relevance of an individual (either a non-member or another member) to another individual (either a non-member or another member). This relevance engine may use signals in the form of data that the social networking service may learn about the individuals to determine how relevant the individuals are to each other. | 02-12-2015 |
20150278353 | METHODS AND SYSTEMS FOR SURFACING CONTENT ITEMS BASED ON IMPRESSION DISCOUNTING - Systems and methods for surfacing content items to a user based on an impression discount are described. For example, an impression discount for a content item is determined. The impression discount may be determined based on a number of times the content item has been surfaced to a user. A selection score for the content item is updated based on the impression discount. The content item is selected from a plurality of content items based on a comparison of the selection score for the content item and selection scores for each of the plurality of content items. The selected content item is then surfaced to a client device corresponding to the user. | 10-01-2015 |
20150278375 | MULTI-OBJECTIVE OPTIMIZATION FOR NEW MEMBERS OF A SOCIAL NETWORK - This disclosure relates to systems and methods that include an electronic database related to members in a social network, the members including new members who have been members of the social network less than a predetermined time and established members who have been members of the social network greater than the predetermined time. A processor, coupled to the electronic database and the network interface, is configured to obtain an optimization criterion based on at least two constraints related to interaction of members in the social network, determine proposed interaction values based on the data, each proposed interaction value corresponding to pairs of members, the proposed interaction values including a new member proposed interaction value between at least one established member and at least one new member, modify the new member proposed interaction value based on an adjustment factor, and provide proposed interactions based the interaction values. | 10-01-2015 |
20150278869 | DISTRIBUTED SCHEDULING ALGORITHM FOR LARGE-SCALE ONLINE PROMOTIONAL CAMPAIGNS - Disclosed in some examples, are systems, methods, and machine readable mediums which implement a scalable algorithm for scheduling promotional campaigns of an online service that satisfy a set of desired constraints while at the same time maximizing a total utility. This algorithm is capable of scheduling hundreds of campaigns for millions of members. In some examples, each promotional campaign may have a utility (which may be described by a utility function) for a particular member and a goal of the scheduling algorithm may be to maximize the total utility for all members eligible for the promotional campaign while satisfying various constraints. | 10-01-2015 |
20150356453 | CONNECTION INVITATION ORDERING - Disclosed in some examples are methods, systems, and machine-readable mediums which provide a relevance engine for determining a relevance of an individual (either a non-member or another member) to another individual (either a non-member or another member). This relevance engine may use signals in the form of data that the social networking service may learn about the individuals to determine how relevant the individuals are to each other. Example applications may include ordering of connection invitations in a social networking service. | 12-10-2015 |
Mohit Tiwari, Goleta, CA US
Patent application number | Description | Published |
---|---|---|
20140259161 | METHOD AND SYSTEMS FOR DETECTING AND ISOLATING HARDWARE TIMING CHANNELS - A method for detecting a timing channel in a hardware design includes synthesizing the hardware design to gate level. Gate level information flow tracing is applied to the gate level of the hardware design via a simulation to search for tainted flows. If a tainted flow is found, a limited number of traces are selected. An input on the limited number of traces is simulated to determine whether the traces are value preserving with respect to taint inputs, and to determine that a timing flow exists if the traces are value preserving with respect to the taint inputs. | 09-11-2014 |
Nitin K. Tiwari, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20100261494 | LATENCY IMPROVEMENT METHODS IN NATIVE PTT GATEWAY FOR A GROUP CALL WITH DISPATCH CONSOLE CLIENTS - A system and method for pre-allocating PTT resources including user/resource credentials at the native PTT gateway are presented. The user status and floor control information can be buffered at the native PTT gateway until the native PTT gateway receives actual resource/end point information from the media handler. Afterwards, the pre-allocation of PTT resources can be correctly mapped to the actual user resources/end point information when the native PTT gateway receives such information from the media handlers and a call is handled. | 10-14-2010 |
Pawan Tiwari, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20120309337 | MULTI-LAYER TIME-INTERLEAVED ANALOG-TO-DIGITAL CONVERTOR (ADC) - A radio frequency (RF) receiver may comprise a first sampling module that is operable to sample in a first level at a particular main sampling rate; a plurality of second-level sampling modules, wherein each of the plurality of second-level sampling modules is operable to sample in a second level, an output of the first level, at a second sampling rate that is reduced compared to the main sampling rate; and a plurality of third-level modules, each comprising a plurality of third-stage sampling sub-modules that are operable to sample at a third sampling rate that is reduced compared to the second sampling rate, and a plurality of corresponding analog-to-digital conversion (ADC) sub-modules. | 12-06-2012 |
20140105339 | SIGNAL RECEIVER WITH MULTI-LEVEL SAMPLING - A signal receiver may comprise a first sampling circuitry that is operable to sample in a first level at a particular main sampling rate; a second sampling circuitry that is operable to sample in a second level, an output of the first sampling circuitry, at a second sampling rate that is reduced compared to the main sampling rate; a third sampling circuitry that is operable to sample in a third level, one or more outputs of the second sampling circuitry, at a third sampling rate that is reduced compared to the second sampling rate; and an analog-to-digital conversion (ADC) circuitry for applying analog-to-digital conversion to one or more outputs of the third sampling circuitry. | 04-17-2014 |
20150092899 | SIGNAL RECEIVER WITH MULTI-LEVEL SAMPLING - A signal receiver may comprise circuitry for applying multi-level sampling to an input signal, using a plurality of sampling rates that comprises at least two different sampling rates, and circuitry for processing one or more outputs of the multi-level sampling. The processing may comprises sampling at a sampling rate that is different than each of the plurality of sampling rates used during the multi-level sampling and applying analog-to-digital conversion. At least one of the sampling rates used during the multi-level sampling and/or the sampling rate used during the processing may be set based on configuring of one or more clock signals used during the multi-level sampling and/or during the processing. At least one of the one or more clock signals may be configured based on reduction of frequency of a corresponding base clock signal. | 04-02-2015 |
Pawan Tiwari, Carlsbad, CA US
Patent application number | Description | Published |
---|---|---|
20140320328 | SUCCESSIVE APPROXIMATION REGISTER ANALOG-TO-DIGITAL CONVERTER - Aspects of a method and apparatus for converting an analog input value to a digital output code are provided. One embodiment of the apparatus includes a digital-to-analog converter, a comparator, and control logic circuitry. The digital-to-analog converter is configured to generate an analog reference value based on a received digital reference value. The comparator is configured to compare an analog input value to the analog reference value after expiration of an allotted settling time for the digital-to-analog converter and generate a comparison result indicative a relationship between the analog input value and the analog reference value. The control logic circuitry is configured to select the allotted settling time for the digital-to-analog converter based on a bit position of a digital output code to be determined, and update the bit position of the digital output code based on the comparison result. | 10-30-2014 |
20150280731 | SUCCESSIVE APPROXIMATION REGISTER ANALOG-TO-DIGITAL CONVERTER - Aspects of a method and apparatus for converting an analog input value to a digital output code are provided. One embodiment of the apparatus includes a digital-to-analog converter, a comparator, and control logic circuitry. The digital-to-analog converter is configured to generate an analog reference value based on a received digital reference value. The comparator is configured to compare an analog input value to the analog reference value after expiration of an allotted settling time for the digital-to-analog converter and generate a comparison result indicative a relationship between the analog input value and the analog reference value. The control logic circuitry is configured to select the allotted settling time for the digital-to-analog converter based on a bit position of a digital output code to be determined, and update the bit position of the digital output code based on the comparison result. | 10-01-2015 |
Prachi Tiwari, Los Altos, CA US
Patent application number | Description | Published |
---|---|---|
20150178519 | DISPLAYING AN ANCESTRY GRAPH WITHIN A SOCIAL NETWORKING SERVICE - Systems and methods for displaying an ancestry graph within a social networking service are provided. A first and a second ancestry graphs are received via accounts of a first and a second user of a social networking service. Each ancestry graph including members of a subset of social contacts of the respective user and ancestry relationships between the respective user and the members of the subset of the social contacts. An ancestry relationship between a third user and the first user of the social networking service is determined, where the first ancestry graph includes the second user and the second ancestry graph includes the third user. The ancestry relationship between the third user and the first user and a suggestion for adding the third user to the first ancestry graph is provided to the first user via the account of the first user. | 06-25-2015 |
Prapanna Tiwari, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20080250364 | METHOD AND SYSTEM FOR VERIFICATION OF MULTI-VOLTAGE CIRCUIT DESIGN - Multi-voltage circuit design verification segregates design elements into iso-voltage-rail blocks. Information on cross-over connections between the iso-voltage-rail blocks is obtained. Voltage effects are simulated in the circuit design, and, based on the cross-over information, the simulation results are modified. This yields more accurate results of simulations for multi-voltage circuit designs. | 10-09-2008 |
Prashant Tiwari, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150099493 | SYSTEMS AND METHODS FOR AUTOMATED ON-DEVICE PERFORMANCE TESTING OF MOBILE APPLICATIONS - Methods and systems for measuring the performance of a mobile application and its associated user page flows include a communication link configured to connect a plurality of mobile client devices to an application server running the mobile application. The system includes a first module configured to implement a plurality of mobile network protocols; a second module configured to implement a plurality of mobile carrier protocols; a third module configured to implement a plurality of mobile operating systems; and a processing module configured to download the application and user pages from the application server and measure performance on each of the plurality of mobile client devices using different combinations of the plurality of mobile network protocols, the plurality of mobile carrier protocols, and the plurality of mobile operating systems. | 04-09-2015 |
Praveen Tiwari, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20160140281 | System On Chip I/O Connectivity Verification In Presence Of Low Power Design Considerations - Formal verification of connectivity of a circuit, for example, a circuit representing a system on chip I/O ring is performed with low power considerations. The formal verification determines whether the connectivity of a circuit remains valid when low power design specification is introduced. The system receives assertions representing connectivity of the circuit. The system receives low power design specification for a circuit that describes power states of power domains of the circuit. The system generates combinational constraints representing valid power states of power domains of the circuit. The system performs formal verification based on the assertions representing the connectivity of the circuit and the combinational constraints representing the power states of power domains of the circuit. The result of the formal verification is used to determine whether the connectivity of the circuit is valid in view of the low power design specification. | 05-19-2016 |
Rakesh Tiwari, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20150038671 | Efficient Synthesis of CN2097 and RC7 and Their Analogs - Synthesized macrocyclic ligand, CN2097 and analogs, optimized with systemic structure modifications to develop the compounds with lower molecular weights and less peptidic characters. | 02-05-2015 |
Ritesh Tiwari, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20110173356 | EXCLUSIVE ACCESS DURING A CRITICAL SUB-OPERATION TO ENABLE SIMULTANEOUS OPERATIONS - A method, apparatus, and system of exclusive access during a critical sub-operation to enable simultaneous operations are disclosed. In one embodiment, a method of a host device includes identifying a critical sub-operation of an operation associated with a storage system, applying a lock associated with the critical sub-operation based on a type of the sub-operation, providing exclusive access of the critical sub-operation to a first instance requiring the critical sub-operation, denying other instances access to the critical sub-operation during an interval comprising a period when the first instance executes the critical sub-operation, and releasing the lock when the critical sub-operation is no longer required by the first instance. The first instance and the other instances may originate on different host devices. | 07-14-2011 |
Ritu Raj Tiwari, Foster City, CA US
Patent application number | Description | Published |
---|---|---|
20140019128 | Voice Based System and Method for Data Input - Described herein are systems and methods for transforming a speech input into machine-interpretable structured data. In some embodiments, a system may include an automated speech recognition (ASR) engine configured to receive a live speech input and to continuously generate a text of the live speech input, a natural language processing (NLP) engine configured to transform the text into machine-interpretable structured data, and a user interface device configured to display the live speech input and a corresponding portion of the structured data in a predetermined order with respect to the structured data. In some embodiments, the method may include the steps of receiving a speech input with a speech capture component of a user interface device, generating a text from the speech input, identifying textual cues in the text, modifying the text based on the textual cues, and transforming the modified text into machine-interpretable structured data. | 01-16-2014 |
Sameer Tiwari, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20110110523 | WIRELESS PERIMETER SECURITY DEVICE AND NETWORK USING SAME - A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the secure area. The system includes a plurality of perimeter Radio Frequency Sentry Devices (RFSDs) that are employed to establish the boundaries of said secure area around said wireless LAN. The wireless LAN being secured may be an industry standard IEEE 802.11a, 801.11b or 802.11g based wireless LAN or any other wireless LAN that uses packet based communication protocols. The said RFSDs may be stand-alone devices or they may be connected to a wired or wireless Local Area Network. | 05-12-2011 |
20110223852 | WIRELESS PERIMETER SECURITY DEVICE AND NETWORK USING SAME - A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the secure area. The system includes a plurality of perimeter Radio Frequency Sentry Devices (RFSDs) that are employed to establish the boundaries of said secure area around said wireless LAN. The wireless LAN being secured may be an industry standard IEEE 802.11a, 801.11b or 802.11g based wireless LAN or any other wireless LAN that uses packet based communication protocols. The said RFSDs may be stand-alone devices or they may be connected to a wired or wireless Local Area Network. | 09-15-2011 |
20110280235 | WIRELESS PERIMETER SECURITY DEVICE AND NETWORK USING SAME - A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the secure area. The system includes a plurality of perimeter Radio Frequency Sentry Devices (RFSDs) that are employed to establish the boundaries of said secure area around said wireless LAN. The wireless LAN being secured may be an industry standard IEEE 802.11a, 801.11b or 802.11g based wireless LAN or any other wireless LAN that uses packet based communication protocols. The said RFSDs may be stand-alone devices or they may be connected to a wired or wireless Local Area Network. | 11-17-2011 |
Sandeep Tiwari, Los Gatos, CA US
Patent application number | Description | Published |
---|---|---|
20120221857 | System And Method For Securing And Tracking Files - A method, system and computer program product for securing and tracking restricted files stored in a data processing system is provided. The data processing system is connected to a server for sharing information. An entity requesting to access a restricted file is authenticated, based on certain policies defined by a system administrator. Further, the system maintains a log of operations executed on the restricted file, and sends a record of the log to the server. | 08-30-2012 |
Sean Tiwari, Glendora, CA US
Patent application number | Description | Published |
---|---|---|
20150306815 | SYSTEMS AND METHODS FOR PERFORATING MATERIALS - Systems and methods for manufacturing laser-perforated nanoreinforced materials are disclosed. A honeycomb core may utilize a perforated top sheet and a microperforated overlay film coupled to the perforated top sheet. The perforated top sheet and/or the microperforated film may include thermally conductive nanomaterials. The perforations in the top sheet and the microperforations in the film may be laser drilled. The nanomaterials may dissipate heat generated by the laser drilling, allowing for increased perforation speeds. | 10-29-2015 |
20160107746 | PERFORATED SURFACE FOR SUCTION-TYPE LAMINAR FLOW CONTROL - An apparatus is provided for promoting laminar flow. The apparatus includes a panel extending between an interior surface and an exterior air flow surface. The panel includes a plurality of macro apertures and a plurality of micro apertures. A first one of the macro apertures extends into the panel from the interior surface. A first one of the micro apertures extends into the panel from the exterior air flow surface and is fluidly coupled with the first one of the macro apertures. | 04-21-2016 |
20160136760 | FORMING ONE OR MORE APERTURES IN A FIBER-REINFORCED COMPOSITE OBJECT WITH A LASER - A process is provided for forming a plurality of apertures in a fiber-reinforced composite object using a laser. The apertures include at least a first aperture and a second aperture. During the process, a scanner head of the laser is operated from a location to selectively scan a laser beam over the object to form a first portion of the first aperture and to form a first portion of the second aperture. The scanner head is also operated from the location to selectively scan the laser beam over the object to form a second portion of the first aperture and to fowl a second portion of the second aperture. | 05-19-2016 |
Shiv Tiwari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140068821 | STRONG ACTIVATION DOMAIN - A new and strong transcriptional activation domain was identified from the | 03-06-2014 |
Shiv Tiwari, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20110126326 | STRONG ACTIVATION DOMAIN - A new and strong transcriptional activation domain was identified from the | 05-26-2011 |
Shiv B. Tiwari, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150052633 | MUTATION OF THE EAR MOTIF OF CLASS II HD-ZIP POLYPEPTIDES - The application describes producing polynucleotide variants of the AtHB 17 clade members and introducing the mutant variants into plants to improve plant traits. The mutant polynucleotides encode polypeptides that comprise mutations in the EAR motifs. | 02-19-2015 |
Vaibhav Tiwari, Pomona, CA US
Patent application number | Description | Published |
---|---|---|
20130177528 | COMPOSITIONS AND METHODS FOR INHIBITING VIRAL INFECTION - Provided herein are compositions and methods for inhibiting viral infection of a host cell. The methods comprise contacting the the host cell with an effective amount of one or more polypeptides having a disintegrin domain. The polypeptide can be CN, VCN or modified ADAM-derived polypeptide (MAP), or a fusion protein comprising a CN, VCN or MAP. | 07-11-2013 |
Vipin Tiwari, Dublin, CA US
Patent application number | Description | Published |
---|---|---|
20140094011 | Self-Aligned Method Of Forming A Semiconductor Memory Array Of Floating Gate Memory Cells With Single Poly Layer - A method of forming a semiconductor memory cell that includes forming the floating and control gates from the same poly layer. Layers of insulation, conductive and second insulation material are formed over a substrate. A trench is formed in the second insulation material extending down to and exposing the conductive layer. Spacers are formed in the trench, separated by a small and defined gap at a bottom of the trench that exposes a portion of the conductive layer. A trench is then formed through the exposed portion of the conductive layer by performing an anisotropic etch through the gap. The trench is filled with third insulation material. Selected portions of the conductive layer are removed, leaving two blocks thereof separated by the third insulation material. | 04-03-2014 |
20140269061 | High Speed Sensing For Advanced Nanometer Flash Memory Device - Improved sensing circuits and improved bit line layouts for advanced nanometer flash memory devices are disclosed. | 09-18-2014 |
20160042790 | Flash Memory System With EEPROM Functionality - The present invention relates to a flash memory device with EEPROM functionality. The flash memory device is byte-erasable and bit-programmable. | 02-11-2016 |