Chakravarthy
Amogh Chakravarthy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130174041 | SUPPORTING DISPLAY OF CONTEXT MENUS IN BOTH CASCADED AND OVERLAPPING STYLES - A computing system provided according to an aspect of the present invention contains a server system operable to send a same hierarchical menu to client systems which display the sub-menus of the hierarchical menu in a overlapping style or a cascading style. As a result, the implementation of server systems supporting such client systems may be simplified. According to another aspect, an event handler is also implemented on the server system, to process the events generated by client system displaying menus in both the overlapping style and the cascading style. According to yet another aspect, a server system stores a in-memory representation of a context menu, and thereafter serves requests from different clients for the same hierarchical menu based on such in-memory representation. | 07-04-2013 |
Ananth Chakravarthy, Pune IN
Patent application number | Description | Published |
---|---|---|
20110010414 | CONTROL OF WEB CONTENT TAGGING - The integrity of an existing tag set associated with a web module is protected by reviewing user-generated proposed additions to the tag set to determine whether the proposed addition is appropriate. An initial test is made to determine whether a proposed addition is trivial; e.g., includes strings of the same character. If the proposed addition is not found to be trivial, it is assessed to determine its relatedness to the existing tag set. The proposed addition is made a part of the tag set only if it is found to be sufficiently related to the existing tag set. | 01-13-2011 |
Ananth Kalyan Gundabattula Chakravarthy, Visakhapatnam IN
Patent application number | Description | Published |
---|---|---|
20090044099 | Portal Interaction Using Ontology-Based Dictionaries - A portal includes one or more portal pages. Each portal page is associated with one or more ontology-based dictionaries. One or more portlets provide content for the portal pages, such that each portal page includes instances of one or more of the portlets. Each portal page is associated with the dictionaries and described using these dictionaries. Each portlet is associated with the ontology-based dictionaries and described using these dictionaries. A broker governs interaction among the portlets and between the portlets and the portal pages by using the ontology-based dictionaries. For instance, the broker governs interaction among the portlets, and between the portlets and the portal pages, by using the ontology-based dictionaries in that properties of the portlets and/or properties of the portal pages that are differently named but correspond to a same attribute are equated as identical via the ontology-based dictionaries. | 02-12-2009 |
Balu Chakravarthy, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20110300141 | Novel Alphabeta-Binding protein and its peptide derivatives and uses thereof - A protein kinase C inhibitor that binds B-amyloid and its peptide derivatives with the same function are disclosed. These may be useful in the treatment of Alzheimer's disease, for example as pseudo vaccines comprising antibodies, or as part of fusion proteins which are able to pass through cell membranes or through the blood-brain barrier. Methods of using the PKC inhibitor and its peptide derivatives for treating Alzheimer's disease are also disclosed. | 12-08-2011 |
E.s. Kalyana Chakravarthy, Noida IN
Patent application number | Description | Published |
---|---|---|
20110213992 | METHOD OF WAKING PROCESSOR FROM SLEEP MODE - A method and apparatus for storing and classifying packets transmitted over a network to a processor in a low power mode. The processor receives and classifies the packets as interesting or not interesting. Uninteresting packets are discarded while interesting packets are stored in memory. For the first interesting packet received, a receive timer is activated and for every interesting packet received a counter is incremented. A transmit timer is activated when the processor enters the low power mode. When either the receive timer expires, the transmit timer expires or the counter reaches a threshold value then a wake-up interrupt is asserted. | 09-01-2011 |
Gundabattula Ananth K. Chakravarthy, Pune IN
Patent application number | Description | Published |
---|---|---|
20110119336 | REMOTE COMMAND EXECUTION OVER A NETWORK - Embodiments of the present invention include methods, systems and computer program products. In one embodiment, a method described herein includes receiving, at a host terminal having a unique identifier, a message including at least an authentication field, an operation field, an entity field and an argument field; and authenticating a remote user in response to the authentication field. The first method can also include identifying an entity selected by the remote user in response to the entity field; identifying an argument selected by the remote user in response to the argument field; and performing an operation selected by the remote user in response to the operation field. Performance of the operation allows the remote user to perform and/or control tasks, communications and/or processes on the host terminal. | 05-19-2011 |
Kalyana Chakravarthy, Delhi IN
Patent application number | Description | Published |
---|---|---|
20100246736 | CLOCK RECOVERY FROM DATA STREAMS CONTAINING EMBEDDED REFERENCE CLOCK VALUES - A method and an improved apparatus for clock recovery from data streams containing embedded reference clock values controlled clock source means includes of a controllable digital fractional divider means receiving a control value from digital comparator means and a clock input from a digital clock synthesizer means driven by a fixed oscillator means. | 09-30-2010 |
K. P. P. Kalyan Chakravarthy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110166865 | COMPUTATIONALLY EFFICIENT AUDIO CODER - The present invention provides a computationally efficient technique for compression encoding of an audio signal, and further provides a technique to enhance the sound quality of the encoded audio signal. This is accomplished by including more accurate attack detection and a computationally efficient quantization technique. The improved audio coder converts the input audio signal to a digital audio signal. The audio coder then divides the digital audio signal into larger frames having a long-block frame length and partitions each of the frames into multiple short-blocks. The audio coder then computes short-block audio signal characteristics for each of the partitioned short-blocks based on changes in the input audio signal. The audio coder further compares the computed short-block characteristics to a set of threshold values to detect presence of an attack in each of the short-blocks and changes the long-block frame length of one or more short-blocks upon detecting the attack in the respective one or more short-blocks. | 07-07-2011 |
20130231939 | COMPUTATIONALLY EFFICIENT AUDIO CODER - The present invention provides a computationally efficient technique for compression encoding of an audio signal, and further provides a technique to enhance the sound quality of the encoded audio signal. This is accomplished by including more accurate attack detection and a computationally efficient quantization technique. The improved audio coder converts the input audio signal to a digital audio signal. The audio coder then divides the digital audio signal into larger frames having a long-block frame length and partitions each of the frames into multiple short-blocks. The audio coder then computes short-block audio signal characteristics for each of the partitioned short-blocks based on changes in the input audio signal. The audio coder further compares the computed short-block characteristics to a set of threshold values to detect presence of an attack in each of the short-blocks and changes the long-block frame length of one or more short-blocks upon detecting the attack in the respective one or more short-blocks. | 09-05-2013 |
20130238344 | COMPUTATIONALLY EFFICIENT AUDIO CODER - The present invention provides a computationally efficient technique for compression encoding of an audio signal, and further provides a technique to enhance the sound quality of the encoded audio signal. This is accomplished by including more accurate attack detection and a computationally efficient quantization technique. The improved audio coder converts the input audio signal to a digital audio signal. The audio coder then divides the digital audio signal into larger frames having a long-block frame length and partitions each of the frames into multiple short-blocks. The audio coder then computes short-block audio signal characteristics for each of the partitioned short-blocks based on changes in the input audio signal. The audio coder further compares the computed short-block characteristics to a set of threshold values to detect presence of an attack in each of the short-blocks and changes the long-block frame length of one or more short-blocks upon detecting the attack in the respective one or more short-blocks. | 09-12-2013 |
Sameer H. Chakravarthy, Noida IN
Patent application number | Description | Published |
---|---|---|
20100088560 | METHOD AND SYSTEM FOR SELECTING TEST VECTORS IN STATISTICAL VOLUME DIAGNOSIS USING FAILED TEST DATA - A method and system for test vector selection in statistical volume diagnosis using failed test data is disclosed. A computer-implemented method receives failures representing defects detected by an integrated circuit testing apparatus from a plurality of integrated circuits. Each of the plurality of integrated circuits is tested with a set of test vectors generated by the integrated circuit testing apparatus, and each of the plurality of failures is associated with a failed test vector. Using a first ranking scheme, each of the failures is given a rank and the corresponding failed test vector in each of the plurality of integrated circuits is annotated with the rank. The annotated failed test vectors are grouped using a grouping scheme, and each of the groups is given a group rank. A first group of failed test vectors is selected based on the group rank and diagnostics is run on the first group of tailed test vectors. | 04-08-2010 |
Sheeram Nallar Chakravarthy, Andhra Pradesh IN
Patent application number | Description | Published |
---|---|---|
20080268503 | Method for Achieving High-Level Expression of Recombinant Human Interleukin-2 Upon Destabilization of the Rna Secondary Structure - The present invention provides a method for achieving high-level expression of the therapeutically important lymphokine (human IL-2). The method comprises of identifying the secondary structure in the 5′ region of human IL-2 mRNA, modifying the 5′ region of the human IL-2 DNA sequence to produce a new DNA sequence wherein the mRNA transcribed from the modified human IL-2 DNA sequence has the predicted 5′ secondary structure destabilized with increased free energy compared to that of the secondary structure of the mRNA transcribed from the native DNA sequence without altering the sequence of the encoded amino acids; and using this modified DNA sequence of human IL-2 for high level recombinant expression in a microbial host for large scale production. This method is also applicable to other expression host like yeasts and mammalian cells. | 10-30-2008 |
Sridhar Chakravarthy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140245296 | SYSTEM AND METHOD FOR VIRTUALIZATION AWARE SERVER MAINTENANCE MODE - In accordance with the present disclosure, a system and method are herein disclosed for providing a virtualization aware server maintenance mode. In one embodiment, an event is triggered in when a system action request is received by an information handling system. The event is processed and the hypervisor is placed in maintenance mode. The virtualization manager is notified that the mode of the hypervisor has changed and the virtualization manager stores the information associated with the mode status change. The virtualization manager may also notify other remote access consoles or virtualization managers of the mode status change of the hypervisor. A maintenance mode lock may be acquired when the hypervisor is placed in maintenance mode and released after the system action has been processed. | 08-28-2014 |
Sridhar Chakravarthy, Bangalore Karnataka IN
Patent application number | Description | Published |
---|---|---|
20130173768 | System and Method for Detection and Deployment of Virtualization Capable Assets in a Managed Datacenter - A datacenter management server includes a datacenter operations manager and a datacenter infrastructure manager with an infrastructure viewer and an asset deployment tool. The datacenter operations manager compiles datacenter hierarchy information for a datacenter, including identity information for a virtualized environment and identity information for a virtualization capable system. The virtualization capable system is deployed as a stand-alone system of the datacenter. The datacenter infrastructure manager receives the datacenter hierarchy information, directs the infrastructure viewer to display a hierarchical overview of the datacenter, including depictions of the virtualized environment and the virtualization capable system. The hierarchical overview is based on the identity information. The datacenter infrastructure manager also receives a selection of the depictions from a user and directs the asset deployment tool to deploy the virtualization capable system to the virtualized environment. | 07-04-2013 |
Srinivasa B S Chakravarthy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120226942 | INTERRUPTIBLE NON-DESTRUCTIVE RUN-TIME BUILT-IN SELF-TEST FOR FIELD TESTING - A built-in self-test (BIST) diagnostic system tests the execution of a processor. The processor is arranged to execute a normal application for controlling a process that is external to the processor. The normal execution is executed in normal execution timeslots that have idle timeslots that are interspersed in time between the normal execution timeslots. A BIST controller is arranged to detect the presence of an idle timeslot in the execution of the processor and to use a scan chain to scan-in a first test pattern for a test application for testing the processor. The first test pattern is executed by the processor during the detected idle timeslot and a first result pattern generated by the execution of the first test pattern is scanned-out. The scanned-out first test pattern is evaluated to determine the presence of an error. The first test pattern application is conditionally interruptible. | 09-06-2012 |
Srinivasan Chakravarthy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20100253563 | CAPACITOR BASED DIGITAL TO ANALOG CONVERTER LAYOUT DESIGN FOR HIGH SPEED ANALOG TO DIGITAL CONVERTER - A method and system for capacitor based digital to analog converter design layout for high speed analog to digital converter are provided. The method includes arranging a plurality of metal plates to form the capacitor. Each of the plurality of metal plates includes a driven plate and a common plate. The method also includes generating a plurality of interconnects in the common plate and extending the driven plate over the plurality of interconnects. Further, the method includes shielding the common plate by the driven plate. The system includes an analog to digital converter. The analog to digital converter also includes capacitor based digital to analog converter and digital logic for controlling digital operations in the analog to digital converter. The capacitor based digital to analog converter includes a plurality of capacitors, and a comparator for comparing the analog output from the digital to analog converter with a ground potential. | 10-07-2010 |
Venkat Chakravarthy, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20090112867 | Anonymizing Selected Content in a Document - A method and system for anonymizing selected content in a document, by receiving as input a document comprising content; assigning user access privileges to identified users based on an access control policy, the access control policy for the user based on a context and a set of pre-defined named entities stored in a repository; identifying named entities in the document; comparing the pre-defined set of named entities based on a context with named entities in the document; concealing the named entities identified in the document matching with the pre-defined set of named entities; and providing as output a document, wherein the set of pre-defined named entities have been concealed based on the identified user access. | 04-30-2009 |
20110125729 | ANALYZING XML DATA - Embodiments of the invention disclose a method, a system and a computer program product of discovering automated insights in XML data by generating a query result in response to querying data using a query, wherein the data is in a markup language format, and identifying a pattern associated with the query result, wherein the data in the markup language format is used for pattern identification. | 05-26-2011 |
20110131216 | AUTOMATICALLY LINKING DOCUMENTS WITH RELEVANT STRUCTURED INFORMATION - A method of associating a given text document with relevant structured data is disclosed. The method receives as inputs a text document, and structured data in the form of a relational database. The method then identifies terms in the text document, and searches and queries the structured data using the terms to identify fragments of the structured data that are relevant to the document. Finally, the text document and the identified fragments of structured data are output to a user. | 06-02-2011 |
20120259836 | Analyzing XML Data - Embodiments of the invention disclose a method, a system and a computer program product of discovering automated insights in XML data by generating a query result in response to querying data using a query, wherein the data is in a markup language format, and identifying a pattern associated with the query result, wherein the data in the markup language format is used for pattern identification. | 10-11-2012 |
20120259837 | Analyzing XML Data - Embodiments of the invention disclose a method, a system and a computer program product of discovering automated insights in XML data by generating a query result in response to querying data using a query, wherein the data is in a markup language format, and identifying a pattern associated with the query result, wherein the data in the markup language format is used for pattern identification. | 10-11-2012 |
V. Srinivas Chakravarthy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120257025 | MOBILE TERMINAL AND THREE-DIMENSIONAL (3D) MULTI-ANGLE VIEW CONTROLLING METHOD THEREOF - Disclosed are a mobile terminal and a method for controlling a 3D multi-angle view thereof. Multi-angle views of a 3D image captured by a plurality of cameras are displayed, switched (converted) and selected according to a touch input. And, a selected angle view of the 3D image undergoes a capturing or a recording. While appreciating different-angle views of a 3D image (broadcast image) captured by a plurality of cameras, a desired angle view of the 3D image may be played, recorded and stored with using a user interface. This may enhance a user's convenience. | 10-11-2012 |