Mudigonda
Ashwin Mudigonda, Nashville, TN US
Patent application number | Description | Published |
---|---|---|
20140070076 | Real-Time Composite 3-D for a Large Field of View Using Multiple Structured Light Sensors - An apparatus for mounting and connecting a plurality of structured light sensors to a personal computer or other computing device. Up to eight structured light sensors of different size and configurations are adjustably mounted to allow positioning of each sensor as desired. The positioning permits the resolution of the sensors to be optimized without compromising the field of view. Where each structure projects a structured light pattern, several mechanisms are sued to control sequential interference-free collection of data. Mechanisms include mechanical shutters, electrically controllable polarized glass, and software control of a sensor's projector. | 03-13-2014 |
Jayaram Mudigonda, Los Altos, CA US
Patent application number | Description | Published |
---|---|---|
20140247718 | Reducing TCP Timeouts due to Incast Collapse at a Network Switch - A network switch for reducing TCP timeouts due to incast collapse is disclosed. The network switch has a plurality of buffers for storing network packets for at least one sender server. An incast buffer management component in the network switch allocates a buffer in the plurality of hullers to store an incast notification packet, the incast notification packet indicating one or mote network packets that have been dropped by the network switch. The network switch also includes an incast notification component for forwarding the incast notification packet to a destination server with an incast notification packet specific header. | 09-04-2014 |
20140258498 | Implementing an Energy Proportional Network Architecture from Desired Network Criteria - Systems, methods, and computer-readable executable instructions are provided for implementing an energy proportional network architecture. Implementing an energy proportional network architecture can include determining a number of desired network criteria and a desired number of access ports. A number of switches for the energy proportional network architecture can be calculated from the desired number of access ports and the number of desired network criteria. Implementing an energy proportional network architecture can also include using the number of calculated switches to form the energy proportional network. | 09-11-2014 |
Koteshwara Mudigonda, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20120322808 | Alpha 4 Beta 2 NEURONAL NICOTINIC ACETYLCHOLINE RECEPTOR LIGANDS - The present invention relates to novel α | 12-20-2012 |
Mallikarjun Mudigonda, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20150295729 | HARDWARE ACCELERATOR FOR TUNNEL PROCESSING - A node for a communications system has a hardware accelerator that supports communications using any of a variety of different, UDP-based, tunnel protocols, and a tunnel software application configures the hardware accelerator to operate for any of the supported tunnel protocols. The hardware accelerator works for any UDP-based, non-cryptographic tunnel protocol. The tunnel software application provides the hardware accelerator with particular instances of generic outbound and inbound profiles that define the header fields for particular tunnel protocols. The hardware accelerator uses those profiles respectively to encapsulate and decapsulate outbound and inbound packets. In this way, tunnel processing is accelerated without having to provide different hardware accelerators for different tunnel protocols. | 10-15-2015 |
Ravishanker Mudigonda, Chula Vista, CA US
Patent application number | Description | Published |
---|---|---|
20090031201 | OPTIMIZED DECODING IN A RECEIVER - A receiver includes a decoder configured to decode at least a portion of a data stream comprising a data frame. The data frame includes a code block having a data block and a parity block. The receiver also includes a controller. The controller is configured to determine whether to disable at least a portion of the receiver during transmission of the parity block to the receiver when the data block contains at least one erasure. | 01-29-2009 |
Ravishanker Mudigonda, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20150148031 | SYSTEMS AND METHODS FOR DYNAMICALLY ADJUSTING ROAMING PARAMETERS - This disclosure includes systems and methods for adjusting one or more roaming parameters using information regarding WLAN activity and/or a connection characteristic indicative of the reliability of the connection. | 05-28-2015 |
Uma Mahesh Mudigonda, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20160087941 | TECHNIQUES FOR PROVIDING SERVICES TO MULTIPLE TENANTS VIA A SHARED END-POINT - A service is provided that supports a plurality of tenants. Server(s) of the service are communicatively coupled with a plurality of gateways of the service. Each gateway is configured to support at least one tenant. The server(s) of the service include a network interface, a tenant mapper, and a gateway interface. The network interface is configured to receive connection strings from client devices. Each received connection string includes a service portion that maps to the same public IP address of the service, and also includes a corresponding tenant portion that identifies a tenant. The tenant mapper maps the tenant portions of the connection strings to corresponding gateways. The gateway interface is configured to enable the gateways to establish tunnels between the corresponding client devices and identified tenants. Accordingly, clients are enabled to access multiple tenants of the service via a same public IP address. | 03-24-2016 |
Uma Mahesh Mudigonda, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110282994 | Method and Apparatus for Controlling Double-Ended Soft Permanent Virtual Circuit/Path Connections - A method and apparatus control a double-ended soft permanent virtual circuit (SPVC) connection coupling from a source end to a destination end via a communications network. The method includes (a) receiving an SPVC connection message from a first network device for the source end, (b) accepting an SPVC connection in accordance with the SPVC connection message if a second network device receiving the SPVC connection has an association with the first network device, and (c) rejecting the SPVC connection if the second network device does not have an association with the first network device. The network device for the destination end includes a database memory adapted to store an access identifier of at least one predetermined source network device from which the network device is allowed to accept an SPVC connection. | 11-17-2011 |
Uma Mahesh Mudigonda US
Patent application number | Description | Published |
---|---|---|
20130067231 | Load Balanced and Prioritized Data Connections - In embodiments of load balanced and prioritized data connections, a first connection is established to communicate first data from a first server to a second server over a public network, where the first data is communicated from a private network to a first device or subnet that is connected to the second server. A second connection is established to communicate second data from the first server to the second server over the public network, where the second data is communicated from the private network to a second device or subnet that is connected to the second server. The second server can distinguish the first data from the second data according to an authentication certificate field that identifies one of a first communication interface of the first connection or a second communication interface of the second connection. | 03-14-2013 |
Venugopalrao Mudigonda, Parker, CO US
Patent application number | Description | Published |
---|---|---|
20150256550 | LOCATION AWARE SECURITY SYSTEM - Methods, computing devices, and systems that dynamically determine whether a request is authorized or fraudulent are described herein. A computing device may receive a request from a communication device, and a geographical location of the communication device may be determined. User information may be requested, and based on the information and the geographical location of the communication device, a risk value can be calculated. A determination of whether to honor the request may be based on the subscriber risk value. | 09-10-2015 |