Patent application number | Description | Published |
20110112352 | APPARATUS AND METHOD FOR ELECTROMAGNETIC TREATMENT - Described herein are electromagnetic treatment devices for treatment of tissue. In particular, described herein are lightweight, wearable, low-energy variations that are specifically configured to specifically and sufficiently apply energy within a specific bandpass of frequencies of a target biological pathway, such as the binding of Calcium to Calmodulin, and thereby regulate the pathway. Methods and systems for treating biological tissue are also described. | 05-12-2011 |
20130274540 | APPARATUS AND METHOD FOR ELECTROMAGNETIC TREATMENT - Described herein are electromagnetic treatment devices for treatment of tissue. In particular, described herein are lightweight, wearable, low-energy variations that are specifically configured to specifically and sufficiently apply energy within a specific bandpass of frequencies of a target biological pathway, such as the binding of Calcium to Calmodulin, and thereby regulate the pathway. Methods and systems for treating biological tissue are also described. | 10-17-2013 |
20140213843 | APPARATUS AND METHOD FOR ELECTROMAGNETIC TREATMENT OF NEUROLOGICAL INJURY OR CONDITION CAUSED BY A STROKE - Described herein are methods of treating neurological injury and conditions, in particular symptoms and complications arising from or caused by a stroke. These treatment methods can include the steps of generating a pulsed electromagnetic field from a pulsed electromagnetic field source and applying the pulsed electromagnetic field in proximity to a target region. | 07-31-2014 |
20140213844 | APPARATUS AND METHOD FOR ELECTROMAGNETIC TREATMENT OF NEUROLOGICAL PAIN - Described herein are methods of treating neurological injury and conditions, in particular neurological pain. These treatment methods can include the steps of generating a pulsed electromagnetic field from a pulsed electromagnetic field source and applying the pulsed electromagnetic field in proximity to a target region. | 07-31-2014 |
20140221726 | APPARATUS AND METHOD FOR ELECTROMAGNETIC TREATMENT OF NEURODEGENERATIVE CONDITIONS - Described herein are methods of treating neurological injury and conditions, in particular neurodegenerative conditions. These treatment methods can include the steps of generating a pulsed electromagnetic field from a pulsed electromagnetic field source and applying the pulsed electromagnetic field in proximity to a target region. | 08-07-2014 |
Patent application number | Description | Published |
20090279471 | LOCAL AND WIDE-AREA TRANSMISSIONS IN A WIRELESS BROADCAST NETWORK - To broadcast different types of transmission having different tiers of coverage in a wireless broadcast network, each base station processes data for a wide-area transmission in accordance with a first mode (or coding and modulation scheme) to generate data symbols for the wide-area transmission and processes data for a local transmission in accordance with a second mode to generate data symbols for the local transmission. The first and second modes are selected based on the desired coverage for wide-area and local transmissions, respectively. The base station also generates pilots and overhead information for local and wide-area transmissions. The data, pilots, and overhead information for local and wide-area transmissions are multiplexed onto their transmission spans, which may be different sets of frequency subbands, different time segments, or different groups of subbands in different time segments. More than two different types of transmission may also be multiplexed and broadcast. | 11-12-2009 |
20100098032 | LOCAL AND WIDE-AREA TRANSMISSIONS IN A WIRELESS BROADCAST NETWORK - To broadcast different types of transmission having different tiers of coverage in a wireless broadcast network, each base station processes data for a wide-area transmission in accordance with a first mode (or coding and modulation scheme) to generate data symbols for the wide-area transmission and processes data for a local transmission in accordance with a second mode to generate data symbols for the local transmission. The first and second modes are selected based on the desired coverage for wide-area and local transmissions, respectively. The base station also generates pilots and overhead information for local and wide-area transmissions. The data, pilots, and overhead information for local and wide-area transmissions are multiplexed onto their transmission spans, which may be different sets of frequency subbands, different time segments, or different groups of subbands in different time segments. More than two different types of transmission may also be multiplexed and broadcast. | 04-22-2010 |
Patent application number | Description | Published |
20120089357 | METHOD AND APPARATUS FOR IDENTIFYING ANOMALIES OF A SIGNAL - A method and apparatus are disclosed for identifying anomalies of a signal, by analyzing a signal using a frequency-based technique, analyzing results of the frequency-based analysis using a statistical analysis technique, determining one or more limits based on the statistical analysis, and comparing a frequency domain representation of the signal to the limits to identify anomalies of the signal. | 04-12-2012 |
20120102377 | METHOD FOR CONSTRUCTING A HISTOGRAM - A method for constructing a histogram can include sampling attributes in a column of a database on a server and determining a bucket set for the histogram based on a number of buckets that represents a distribution of the attributes with minimum error. A bucket in the bucket set includes boundaries and an approximation of a count of attributes falling within the boundaries. The method further includes determining a precision for encoding the approximation, such that the histogram having the bucket set fits within a storage limit on a tangible computer-readable medium. The histogram can then be stored for the database on a tangible computer-readable medium by encoding the approximation with the precision. | 04-26-2012 |
20120201462 | JOINT IMAGE COMPRESSION METHOD AND APPARATUS - A joint image compression system ( | 08-09-2012 |
20130030761 | STATISTICALLY-BASED ANOMALY DETECTION IN UTILITY CLOUDS - Systems and methods for detecting anomalies in a large scale and cloud datacenter are disclosed. Anomaly detection is performed in an automated, statistical-based manner by using a parametric Gini coefficient technique or a non-parametric Tukey technique. In the parametric Gini coefficient technique, sample data is collected within a look-back window. The sample data is normalized to generate normalized data, which is binned into a plurality of bins defined by bin indices. A Gini coefficient and a threshold are calculated for the look-back window and the Gini coefficient is compared to the threshold to detect an anomaly in the sample data. In the non-parametric Tukey technique, collected sample data is divided into quartiles and compared to adjustable Tukey thresholds to detect anomalies in the sample data. | 01-31-2013 |
20130080375 | ANOMALY DETECTION IN DATA CENTERS - Systems and methods of anomaly detection in data centers. An example method may include analyzing time series data for the data center by testing statistical hypotheses. The method may also include constructing upper and lower bounds based on the statistical hypotheses. The method may also include flagging anomalies in the time series data falling outside of the upper and lower bounds. | 03-28-2013 |
20130110761 | SYSTEM AND METHOD FOR RANKING ANOMALIES | 05-02-2013 |
20130111164 | HARDWARE COMPRESSION USING COMMON PORTIONS OF DATA | 05-02-2013 |
20130226904 | DETERMINING DISTANCE BETWEEN DATA SEQUENCES - A lowest common ancestor of a first data sequence and a second data sequence is determined. Based on the lowest common ancestor, symbols that differ between the first data sequence and the second data sequence are identified. A distance between the first data sequence and the second data sequence is determined based on the symbols. | 08-29-2013 |
20130290350 | Similarity Search Initialization - A similarity search initialization system includes a leaf selector to select a leaf of a suffix tree generated from a target string representing a target sequence. The selected leaf is associated with a prefix in the suffix tree having a longest match to a suffix of a query string representing a query. The system further includes a distance module to determine a distance between the query and a subsequence of the target sequence represented by a candidate substring of the target string. The candidate substring includes the prefix associated with the selected leaf. The determined distance is to provide an initial upper bound in a similarity search of the target sequence using the query. | 10-31-2013 |
20140039798 | SYSTEM AND METHODS FOR GROUPING SIMILAR ITEMS WITHIN A SET - A system is disclosed comprising a non-transitory, computer-readable storage device storing software. The software, when executed by a processor, causes the processor to perform the following operations for each of a plurality of non-functional electronic devices: count a number of other non-functional electronic devices within a defined distance from the non-functional electronic device; and define the non-functional electronic device to be a core electronic device if the counted number is at least a threshold value, wherein threshold value is based on a total number of electronic devices within the defined distance around the non-functional electronic device. For each core electronic device, the software, when executed by a processor, further causes the processor to form a neighborhood group comprising the core electronic device and other non-functional electronic devices within the defined distance around the core electronic device. | 02-06-2014 |
20140215493 | EVENT DETERMINATION - Event determination can include selecting a time lag, calculating a dependency value at the time lag between event pairs within a first textual stream and a second textual stream, and ordering the event pairs based on the dependency value. | 07-31-2014 |
Patent application number | Description | Published |
20090112900 | Collaborative Compression - Provided are, among other things, systems, methods and techniques for collaborative compression, in which is obtained a collection of files, with individual ones of the files including a set of ordered data elements (e.g., bit positions), and with individual ones of the data elements having different values in different ones of the files, but with the set of ordered data elements being common across the files. The data elements are partitioned into an identified set of bins based on statistics for the values of the data elements across the collection of files, and a received file is compressed based on the bins of data elements. | 04-30-2009 |
20110119284 | GENERATION OF A REPRESENTATIVE DATA STRING - Provided are, among other things, systems, methods and techniques for generating a representative data string. In one representative implementation: (a) starting data positions are identified within input strings of data values; (b) a subsequence of output data values is determined based on the data values at data positions determined with reference to the starting data positions within the input strings; (c) an identification is made as to which of the input strings have segments that match the subsequence of output data values, based on a matching criterion; (d) steps (a)-(c) are repeated for a number of iterations; and (e) the subsequences of output data values are combined across the iterations to provide an output data string, with the determination in step (b) for a current iteration being based on the identification in step (c) for a previous iteration. | 05-19-2011 |
Patent application number | Description | Published |
20110029300 | Translating Documents Based On Content - A document containing text in a source language may be translated into a target language based on content associated with that document, in conjunction with the present technology. An indication to perform an optimal translation of a document into a target language may be received via a user interface. The document may then be accessed by a computing device. The optimal translation is executed by a preferred translation engine of a plurality of available translation engines. The preferred translation engine is the most likely to produce the most accurate translation of the document among the plurality of available translation engines. Additionally, the preferred translation engine may be identified based on content associated with the document. The document is translated into the target language using the preferred translation engine to obtain a translated document, which may then be outputted by a computing device. | 02-03-2011 |
20110082683 | Providing Machine-Generated Translations and Corresponding Trust Levels - A quality-prediction engine predicts a trust level associated with translational accuracy of a machine-generated translation. Training a quality-prediction may include translating a document in a source language to a target language by executing a machine-translation engine stored in memory to obtain a machine-generated translation. The training may further include comparing the machine-generated translation with a human-generated translation of the document. The human-generated translation is in the target language. Additionally, the training may include generating a mapping between features of the machine-generated translation and features of the human-generated translation based on the comparison. The mapping may allow determination of trust levels associated with translational accuracy of future machine-generated translations that lack corresponding human-generated translations. Machine-generated translations may then be credibly provided by translating a document from a source language to a target language by executing a machine-translation engine stored in memory to obtain a machine-generated translation, predicting a trust level of the machine-generated translation by executing a quality-prediction engine stored in memory, and outputting the machine-generated translation and the trust level. | 04-07-2011 |
20110082684 | Multiple Means of Trusted Translation - Customers having a translation project to select a translation method from a variety of options, ranging from a completely human translation to a completely automated translation. For human translations, translation job information may be communicated through one or more network service modules which execute within a network service application, such as a web-based networking application. A network service module may register a user having an account with the network service application as a translator and communicate translation jobs to the user. One or more users who express interest in performing the translation are selected to perform a translation job, each job comprising at least a portion of the translation project. After a user provides a translation for the translation job, the translation is analyzed to generate a trust level prediction for the translation. A user translation profile may be updated after each translation to reflect the user's performance. | 04-07-2011 |
20110225104 | Predicting the Cost Associated with Translating Textual Content - A prediction of the cost associated with translating textual content in a source language can be determined. A first quantity estimation of first textual content may be determined. The first textual content is to be translated via human translation. A second quantity estimation of second textual content may also be determined. The second textual content is to be translated via machine translation. An indication of a target language is obtained, wherein the source language and the target language form a language pair. The prediction of the cost associated with translating the first textual content and the second textual content from the source language to the target language is then determined. The prediction is based at least in part on the first quantity estimation, the second quantity estimation, and the language pair. | 09-15-2011 |
20130238310 | CONTENT PAGE URL TRANSLATION - The present technology may translate a content of a web page such as content locator (e.g., a uniform resource locator (URL)) from a source language to a target language. The content locator may be associated with a content page. The translation may involve dividing the content locator into segment tokens in a first language, followed by translating, transliterating or not changing a segment token. The processed tokens are then reassembled in a second language. The translation may be provided by a translation module through a content page provided by a network browser. | 09-12-2013 |
Patent application number | Description | Published |
20110255444 | POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Proxy discovery for mobile networks having cooperative multiradio devices is provided through short range discovery and assistance from the network. In some aspects, a dedicated message is sent in response to a request from the client. The dedicated message includes a proxy list. The client uses the proxy list to discover those proxies on the list. Other aspects provide for the proxy list to be included in broadcast messages from the network. Thus, clients receive the broadcast messages and extract the proxy list for discovery purposes. Other aspects provide for the client to detect all of the wireless devices in the area and send a list to the network. The network responds with a sub-list of those proxies that are available to the client. In each such aspect, when the client discovers the available proxies, it transmits a list of the proxy ID of the discovered proxies to the network. | 10-20-2011 |
20110255692 | POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public key to generate an encryption key in an AES encryption algorithm. A second aspect provides for out of band security to be used to establish short range protocol pairing. In this second aspect, the client and proxy exchange identification information over a third party network that is out of band to the short range protocol. With this identification information exchanged out of band, the client and proxy may establish pairing in the short range protocol. | 10-20-2011 |
20110256891 | POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES - Page monitoring in a proxy relationship is optimized through creation of a new page occasion (PO) or paging frame (PF). The new PO/PF includes pages for each client-proxy relationship. Once the new PO/PF is communicated to the proxy, the proxy monitors for the pages of each client by monitoring a single PO/PF. Depending on the embodiment implemented, the network will either continue to also transmit pages during original PO or cease such transmission. On detection of a failed link between the proxy and client, the client may begin to monitor the original pages in such networks, or will begin monitoring using the new PO/PF until the network notifies the client that the state has changed. | 10-20-2011 |
20130136116 | MULTIPATH OVERLAY NETWORK AND ITS MULTIPATH MANAGEMENT PROTOCOL - A method, a computer program product, and an apparatus are provided. The apparatus, which is a first node, sends a join request to a second node to route communication associated with a third node to the first node. The join request includes a first node identifier associated with the first node. The first node receives from the second node a join response comprising a second node identifier associated with the second node. The first node sends a setup request to the third node, the setup request comprising the second node identifier. The first node receives a communication with the first node identifier from the second node, the communication originating from the third node. | 05-30-2013 |
20150098457 | ENABLING INTERNET PROTOCOL CONNECTIVITY ACROSS MULTI-HOP MOBILE WIRELESS NETWORKS VIA A SERVICE ORIENTED ARCHITECTURE - The disclosure provides a method, apparatus, and computer program product directed towards enabling internet protocol (IP) connectivity across multi-hop wireless networks. A virtual adapter is generated to facilitate creating a virtual link layer between a virtual link layer node and at least one other virtual link layer node. The virtual link layer is then interfaced with an IP layer via the virtual adapter, such that data transmitted over the virtual link layer is accessible to the IP layer via the virtual adapter. | 04-09-2015 |
Patent application number | Description | Published |
20120151556 | METHOD AND APPARATUS FOR DIGITAL RIGHTS MANAGEMENT POLICIES - Method and apparatus are described wherein, in one example embodiment, there is provided one or more policy templates that may define a set of policy permissions or other attributes that may be desirable to specify in a policy. One or more policy templates may be specified in a user interface of a policy creation and maintenance program that may run on the policy server and/or run on a workstation computer. Each policy template specified by a user may include permissions for how a user may access and use a document. The maintenance program may, in one embodiment, associate both templates to a policy used for a specific unit of digital content, or, for example, an electronic document. The permissions for the policy are determined by aggregating the permissions associated with each respective templates chosen by the user. According to another example embodiment, a user selects a policy template and defines one or more additional permissions to form an augmented policy. | 06-14-2012 |
20140013444 | Authentication using a digital rights management policy - Method and apparatus are provided wherein, in one example embodiment, an authentication scheme may be defined as part of a digital rights management policy. Authentication rules are defined for a unit of digital content whose location can be anywhere. Further, the digital rights management system may support many authentication schemes while permitted schemes can be fine tuned for individual policies and therefore for individual units of digital content. According to other example embodiments, one or more preferred authentication schemes can be added to a rights management policy. They can be either requested or required for authentication. In addition, in other example embodiments, the reader application may be informed of specific authentication schemes being demanded for a document. If none of the authentication schemes are available then the user can be informed without attempting to authenticate unsuccessfully. | 01-09-2014 |
Patent application number | Description | Published |
20090222829 | METHOD AND APPARATUS FOR DECOMPOSING I/O TASKS IN A RAID SYSTEM - A data access request to a file system is decomposed into a plurality of lower-level I/O tasks. A logical combination of physical storage components is represented as a hierarchical set of objects. A parent I/O task is generated from a first object in response to the data access request. A child I/O task is generated from a second object to implement a portion of the parent I/O task. The parent I/O task is suspended until the child I/O task completes. The child I/O task is executed in response to an occurrence of an event that a resource required by the child I/O task is available. The parent I/O task is resumed upon an event indicating completion of the child I/O task. Scheduling of any child I/O task is not conditional on execution of the parent I/O task, and a state diagram regulates the child I/O tasks. | 09-03-2009 |
20100095060 | LOCATION-INDEPENDENT RAID GROUP VIRTUAL BLOCK MANAGEMENT - A computer storage system is described. A range of volume block numbers (VBNs) is assigned to a volume. A range of storage device block numbers (DBNs) is assigned to each of a plurality of storage devices. A first mapping parameters are created to map a first range of VBN numbers to a first selected range of DBNs using a first portion of a new storage device. A second mapping parameters are created to map a second range of VBN numbers to a second range of DBNs on a second portion of the new storage device. | 04-15-2010 |
20110191780 | METHOD AND APPARATUS FOR DECOMPOSING I/O TASKS IN A RAID SYSTEM - A data access request to a file system is decomposed into a plurality of lower-level I/O tasks. A logical combination of physical storage components is represented as a hierarchical set of objects. A parent I/O task is generated from a first object in response to the data access request. A child I/O task is generated from a second object to implement a portion of the parent I/O task. The parent I/O task is suspended until the child I/O task completes. The child I/O task is executed in response to an occurrence of an event that a resource required by the child I/O task is available. The parent I/O task is resumed upon an event indicating completion of the child I/O task. Scheduling of any child I/O task is not conditional on execution of the parent I/O task, and a state diagram regulates the child I/O tasks. | 08-04-2011 |
20140173198 | METHOD AND APPARATUS FOR DECOMPOSING I/O TASKS IN A RAID SYSTEM - A data access request to a file system is decomposed into a plurality of lower-level I/O tasks. A logical combination of physical storage components is represented as a hierarchical set of objects. A parent I/O task is generated from a first object in response to the data access request. A child I/O task is generated from a second object to implement a portion of the parent I/O task. The parent I/O task is suspended until the child I/O task completes. The child I/O task is executed in response to an occurrence of an event that a resource required by the child I/O task is available. The parent I/O task is resumed upon an event indicating completion of the child I/O task. Scheduling of any child I/O task is not conditional on execution of the parent I/O task, and a state diagram regulates the child I/O tasks. | 06-19-2014 |
Patent application number | Description | Published |
20110224811 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - System for providing interactive two-way audio in desktop virtualization environment, the desktop virtualization environment comprising desktop virtualization server computer and desktop virtualization client endpoint device with associated microphone element. The system incorporates instance of server software executing on the desktop virtualization server and providing interactive user interface functions to associated desktop virtualization client endpoint device; and instance of endpoint software executing on the desktop virtualization client endpoint device including network port, the instance of endpoint software receiving an incoming real-time audio stream from the network port and providing real-time and audio playback functions on the desktop virtualization client endpoint device. In the system, the desktop virtualization client endpoint is configured to: accept real-time audio input from a microphone element associated with the desktop virtualization client endpoint; and provide an outgoing real-time compressed audio stream to the network port responsive to the real-time audio input from the microphone element. | 09-15-2011 |
20110225313 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - System for providing interactive two-way real-time media in a desktop virtualization environment including a desktop virtualization server computer and a desktop virtualization endpoint device with video camera. System incorporates: instance of server software running on desktop virtualization server and providing interactive user interface functions to desktop virtualization endpoint device, instance of software accessing network; instance of endpoint software running on desktop virtualization endpoint device, instance of software accessing network; first network connection between instance of server software and instance of endpoint software, first network connection implemented using access to network comprised by instance of server software and access to network comprised by instance of endpoint software; and second network connection between instance of server software and instance of endpoint software, second network connection distinct from first network connection and implemented using access to network comprised by instance of server software and access to network comprised by instance of endpoint software. | 09-15-2011 |
20110225512 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - System for providing interactive two-way video in desktop virtualization environment, desktop virtualization environment comprising a desktop virtualization server computer and a desktop virtualization client endpoint device with associated video camera. The system includes server software for running on a desktop virtualization server and providing at least interactive user interface functions to the desktop virtualization client endpoint device and endpoint software for running on the desktop virtualization endpoint device comprising a network port, the at least one instance of endpoint software receiving an incoming real-time video stream from the network port and providing at least real-time and display functions on the desktop virtualization client endpoint device. The desktop virtualization client endpoint is configured to: accept real-time video input from a video camera associated with the desktop virtualization client endpoint and provide outgoing real-time compressed video stream to the network port responsive to the real-time video input from the video camera. | 09-15-2011 |
20110225513 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - A system for providing interactive two-way real-time media in desktop virtualization environment, the desktop virtualization environment comprising at least one desktop virtualization server computer and at least one desktop virtualization client endpoint device with an associated video camera. The system incorporates: at least one instance of server software executing on the desktop virtualization server for providing at least interactive user interface functions to an associated desktop virtualization client endpoint device, the instance of software configured to access a network; at least one instance of endpoint software executing on a desktop virtualization client endpoint device, the instance of software further comprising access to the network; and a terminal-server/terminal-client network connection between the instance of server software and instance of endpoint software, the network connection implemented using the access to the network comprised by the instance of server software and the access to network comprised by the instance of endpoint software. | 09-15-2011 |
20110225578 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - Method for implementing a software application in networked desktop virtualization environment, desktop virtualization environment including desktop virtualization server and desktop virtualization endpoint device, both in communication with one another over network. Method involves: structuring software with multiple internal elements and interfaces among them; installing first instance of software on desktop virtualization server, detecting characteristics of desktop virtualization server computer; in first instance of article of software, selectively enabling first set of internal software elements and disabling remaining internal software elements based on results of detecting on server computer; installing second instance of software on desktop virtualization client endpoint device; detecting characteristics of desktop virtualization endpoint device; in second instance of article of software, selectively enabling second set of internal software elements and disabling remaining internal software elements based on results of detecting on desktop virtualization client endpoint device; and establishing an association of second instance of software with first instance of software. | 09-15-2011 |