Patent application number | Description | Published |
20100293407 | Systems, Methods, and Media for Recovering an Application from a Fault or Attack - Systems, methods, and media for recovering an application from a fault or an attack are disclosed herein. In some embodiments, a method is provided for enabling a software application to recover from a fault condition. The method includes specifying constrained data items and assigning a set of repair procedures to the constrained data items. The method further includes detecting a fault condition on the constrained data items during execution of the software application, which triggers at least one repair procedure. The triggered repair procedures are executed and the execution of the software application is restored. In some embodiments, the restoring comprises providing memory rollback to a point of execution of the software application before the fault condition was detected. | 11-18-2010 |
20110214161 | METHODS, MEDIA, AND SYSTEMS FOR SECURING COMMUNICATIONS BETWEEN A FIRST NODE AND A SECOND NODE - Methods, media, and systems for securing communications between a first node and a second node are provided. In some embodiments, methods for securing communication between a first node and a second node are provided. The methods comprising: receiving at least one model of behavior of the second node at the first node; and authorizing the first node to receive traffic from the second node based on the difference between the at least one model of behavior of the second node and at least one model of behavior of the first node. | 09-01-2011 |
20130179968 | SYSTEMS, METHODS, AND MEDIA FOR GENERATING SANITIZED DATA, SANITIZING ANOMALY DETECTION MODELS, AND/OR GENERATING SANITIZED ANOMALY DETECTION MODELS - Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and generating anomaly detection models are provided. In some embodiments, methods for sanitizing anomaly detection models are provided. The methods including: receiving at least one abnormal anomaly detection model from at least one remote location; comparing at least one of the at least one abnormal anomaly detection model to a local normal detection model to produce a common set of features common to both the at least one abnormal anomaly detection model and the local normal detection model; and generating a sanitized normal anomaly detection model by removing the common set of features from the local normal detection model. | 07-11-2013 |
20150261624 | SYSTEMS, METHODS, AND MEDIA FOR RECOVERING AN APPLICATION FROM A FAULT OR ATTACK - Systems, methods, and media for recovering an application from a fault or an attack are disclosed herein. In some embodiments, a method is provided for enabling a software application to recover from a fault condition. The method includes specifying constrained data items and assigning a set of repair procedures to the constrained data items. The method further includes detecting a fault condition on the constrained data items during execution of the software application, which triggers at least one repair procedure. The triggered repair procedures are executed and the execution of the software application is restored. In some embodiments, the restoring comprises providing memory rollback to a point of execution of the software application before the fault condition was detected. | 09-17-2015 |
20150326597 | SYSTEMS, METHODS, AND MEDIA FOR GENERATING SANITIZED DATA, SANITIZING ANOMALY DETECTION MODELS, AND/OR GENERATING SANITIZED ANOMALY DETECTION MODELS - Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and generating anomaly detection models are provided. In some embodiments, methods for sanitizing anomaly detection models are provided. The methods including: receiving at least one abnormal anomaly detection model from at least one remote location; comparing at least one of the at least one abnormal anomaly detection model to a local normal detection model to produce a common set of features common to both the at least one abnormal anomaly detection model and the local normal detection model; and generating a sanitized normal anomaly detection model by removing the common set of features from the local normal detection model. | 11-12-2015 |
Patent application number | Description | Published |
20140097631 | KINETIC AND DIMENSIONAL OPTIMIZATION FOR A TENDON-DRIVEN GRIPPER - A tendon-driven robotic gripper is disclosed for performing fingertip and enveloping grasps. One embodiment comprises two fingers, each with two links, and is actuated using a single active tendon. During unobstructed closing, the distal links remain parallel, creating exact fingertip grasps. Conversely, if the proximal links are stopped by contact with an object, the distal links start flexing, creating a stable enveloping grasp. The route of the active tendon and the parameters of the springs providing passive extension forces are optimized in order to achieve this behavior. An additional passive tendon is disclosed that may be used as a constraint preventing the gripper from entering undesirable parts of the joint workspace. A method for optimizing the dimensions of the links in order to achieve enveloping grasps of a large range of objects is disclosed and applied to a set of common household objects. | 04-10-2014 |
20140346796 | KINETIC AND DIMENSIONAL OPTIMIZATION FOR A TENDON-DRIVEN GRIPPER - A tendon-driven robotic gripper is disclosed for performing fingertip and enveloping grasps. One embodiment comprises two fingers, each with two links, and is actuated using a single active tendon. During unobstructed closing, the distal links remain parallel, creating exact fingertip grasps. Conversely, if the proximal links are stopped by contact with an object, the distal links start flexing, creating a stable enveloping grasp. The route of the active tendon and the parameters of the springs providing passive extension forces are optimized in order to achieve this behavior. An additional passive tendon is disclosed that may be used as a constraint preventing the gripper from entering undesirable parts of the joint workspace. A method for optimizing the dimensions of the links in order to achieve enveloping grasps of a large range of objects is disclosed and applied to a set of common household objects. | 11-27-2014 |
20150151437 | KINETIC AND DIMENSIONAL OPTIMIZATION FOR A TENDON-DRIVEN GRIPPER - A tendon-driven robotic gripper is disclosed for performing fingertip and enveloping grasps. One embodiment comprises two fingers, each with two links, and is actuated using a single active tendon. During unobstructed closing, the distal links remain parallel, creating exact fingertip grasps. Conversely, if the proximal links are stopped by contact with an object, the distal links start flexing, creating a stable enveloping grasp. The route of the active tendon and the parameters of the springs providing passive extension forces are optimized in order to achieve this behavior. An additional passive tendon is disclosed that may be used as a constraint preventing the gripper from entering undesirable parts of the joint workspace. A method for optimizing the dimensions of the links in order to achieve enveloping grasps of a large range of objects is disclosed and applied to a set of common household objects. | 06-04-2015 |