Shravan
Shravan Geonkar, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20150046926 | VIRTUAL MACHINE DEPENDENCY - One or more techniques and/or systems are provided for describing virtual machine dependencies. In particular, data objects, such as virtual hard drives, associated with virtual machines may be identified and/or examined to identify data structures, such as configuration files, comprising configuration data. The configuration data may be analyzed to determine dependency relationships between virtual machines to describe virtual machine dependencies. Identifying virtual machine dependencies, among other things, allows virtual machines that are no longer used to be repurposed, deleted, reset, etc. with little to no adverse effect on other virtual machines. | 02-12-2015 |
Shravan Kambam, New York, NY US
Patent application number | Description | Published |
---|---|---|
20100298622 | APPARATUSES AND TECHNIQUES FOR BIOACTIVE DRUG DELIVERY IN THE PROSTATE GLAND - Methods and apparatuses for the delivery of bioactive substances into the prostate. The present invention encompasses the release of bioactive substances into the prostate of a patient. Preferably, the present invention employs either a sustained-release or depot formulation of the bioactive substance to release the substance over an extended period of time. In particularly-preferred embodiments, the apparatuses of the present invention release of anti-inflammatory agents into the prostate. The anti-inflammatory agents preferably reduce the inflammation that is associated with brachytherapy and other conditions of the prostate. In particular, corticosteroid anti-inflammatory agents are employed in the context of the present invention. | 11-25-2010 |
Shravan Mahidhara, Palatine, IL US
Patent application number | Description | Published |
---|---|---|
20120173875 | METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION IN A SELF-ORGANIZING NETWORK - A communication system provides secure communication between two nodes in a self-organizing network without the need for a centralized security or control device. A first node of the two nodes is provisioned with one or more security profiles, auto-discovers a second node of the two nodes, authenticates the second node based on a security profile of the one or more security profiles, selects a security profile of the one or more security profiles to encrypt a communication session between the two nodes, and encrypts the communication session between the two nodes based on the selected security profile. The second node also is provisioned with the same one or more security profiles, authenticates the first node based on a same security profile as is used to authenticate the second node, and encrypts the communication session based on the same security profile as is used for encryption by the first node. | 07-05-2012 |
Shravan Rangarju, Clarksburg, MD US
Patent application number | Description | Published |
---|---|---|
20140269704 | CONTROLLED FLOODING MECHANISM TO FACILITATE MESSAGE BROADCAST IN WIRELESS MULTIHOP NETWORKS - In a wireless multihop network having node devices within communication range neighboring node devices in a corresponding local neighborhood, the node devices initiate repeated message broadcasts of a first message as a connection-less broadcast into the local neighborhood. Initiation of message broadcasts is governed such that the message broadcasts are permitted only at specified transmission times within a plurality of transmission time windows. Each of the node devices determines whether any of the connection-less-broadcasted messages are duplicates of the first message, and generate a count of those duplicates received during each of the transmission windows. Based on counts of the duplicates, initiation of a message broadcast of the first message in a current transmission window is suppressed in response to a corresponding count of duplicates of the first message received during the first transmission window exceeding a suppression limit. | 09-18-2014 |
Shravan Rayanchu, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20140071845 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR DETECTING, QUANTIFYING AND LOCALIZING OF WIRELESS INTERFERERS - A method, system and program product comprise receiving spectrum data from one or more WiFi communication devices being configured to be operable as observers of transmissions within a frequency band associated with a WiFi communication system. The spectrum data at least comprises signal levels and timing information for WiFi communication signals and non-WiFi signals observed within the frequency band. WiFi interferers are distinguished using at least the signal levels and timing information for the non-WiFi signals. A real-time interference impact on the observed WiFi communication signals for each of the distinguished WIFi interferers is determined. | 03-13-2014 |
20140169194 | Method, System and Program Product for Detecting Wireless Interferers - A method, system and program product comprise generating spectral samples from at least one radio communication device being configured to be operable as an observer of transmissions within a frequency band divided into one or more sub-bands associated with communications of the radio communication device. The spectral samples at least comprise signal levels and timing information for observed signals within the sub-bands. Spectral samples determined to be decodable communications are purged. Pulses in the spectral samples are identified. The identified pulses at least comprise a power, a center frequency and a bandwidth. A list of identified pulses for the sub-bands is maintained. At least a set of features of the identified pulses in the list is extracted. A presence of at least one radio frequency device associated with the set is detected. | 06-19-2014 |
Shravan Rayanchu, Madison, WI US
Patent application number | Description | Published |
---|---|---|
20100080183 | System And Method For Interference Mitigation In Wireless Networks - A computer-implemented method for scheduling a packet for transmission in a wireless local area network can be used to account for hidden and/or exposed terminals. The method includes determining whether the packet is to be transmitted to a computing device through a wireless access point that is in conflict with at least one other computing device associated with a different access point. The method further includes determining whether there is a conflicting packet scheduled to be transmitted for any conflicting computing devices associated with a different access points and scheduling the packet for transmission based on any conflicting packets. The method yet further includes forwarding the packet to a wireless access point at the scheduled time. | 04-01-2010 |
20100195548 | NETWORK ASSISTED POWER MANAGEMENT - Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range. | 08-05-2010 |
20130054948 | Attestation Protocol for Securely Booting a Guest Operating System - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 02-28-2013 |
20130290526 | NETWORK ASSISTED POWER MANAGEMENT - Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range. | 10-31-2013 |
20140359270 | ATTESTATION PROTOCOL FOR SECURELY BOOTING A GUEST OPERATING SYSTEM - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 12-04-2014 |
Shravan Sogani, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20150242422 | Accessing Software Application Functionality In Search - A method includes transmitting a search query from a computing device to a search system configured to generate search results in response to a received search query, and receiving search results from the search system in response to transmitting the search query. The search results include an application access mechanism that references a native application and indicates one or more operations for the application to perform. The application performing the operations sets the application into an application state. The search results also include an application download address that indicates a location for downloading the application. The method also includes generating a user selectable link that includes the application access mechanism and the application download address, and displaying the user link. In response to receiving a user selection of the selectable link, the method also includes downloading, installing, launching, and causing the native application to perform the one or more operations. | 08-27-2015 |