Dinerstein
Jonathan Dinerstein, Draper, UT US
Patent application number | Description | Published |
---|---|---|
20090040220 | Hybrid volume rendering in computer implemented animation - In the field of computer graphics and more specifically computer implemented animation, two known alternative methods for rendering objects which have volume (fire, smoke, clouds, etc.) are ray marching and splatting (i.e. particle-based rendering). These methods have contrasting strengths and weaknesses. The present volume rendering method and associated apparatus combine these methods, drawing on the strengths of each. The ray marches a volume but, rather than merely accumulating the samples along the ray, a distinct particle is generated for each sample. Each particle captures the volume's local attributes. The particles are then rendered through splatting. Thus the method has the strengths of splatting e.g., fast 3D motion blur and hardware rendering, and the strengths of ray marching e.g., volume sampling density corresponds with camera proximity since rays disperse, thereby focusing computer processing time on important volume detail and minimizing noise. The present method is useful in production of animated feature films, providing fast high-quality volume rendering with true 3D motion blur. | 02-12-2009 |
20110150303 | STANDOFF AND MOBILE FINGERPRINT COLLECTION - A method, a biometric identifier collection device, and a set of instructions are disclosed. A memory | 06-23-2011 |
Jonathan J. Dinerstein, Draper, UT US
Patent application number | Description | Published |
---|---|---|
20100008550 | Method and apparatus for facial identification - Aspects of the disclosure can provide a face recognition method of increased robustness. The face recognition method can include receiving a target face image, initializing a registration and a block analysis of the target face image identifying one or more portions of the target face image for face recognition, informing a user of the registration and the block analysis, receiving one or more instructions from the user for operating on the registration and the block analysis, and identifying the target face image from a plurality of face images based on the registration and the block analysis of the target face image when the registration and the block analysis are approved by the user. | 01-14-2010 |
20120078886 | BIOMETRIC INDEXING AND SEARCHING SYSTEM - A prototype biometric identification system is disclosed that indexes a biometric corpus into indexed-corpuses using a set of P prototypes before searching for a probe in a search corpus constructed based on the indexed-corpus. The system may index the biometric corpus based on the prototypes directly or based on prototype-typicality scores. | 03-29-2012 |
20120101822 | BIOMETRIC SPEAKER IDENTIFICATION - A biometric speaker-identification apparatus is disclosed that generates ordered speaker-identity candidates for a probe based on prototypes. Probe match scores are clustered, and templates that correspond to clusters having top M probe match scores are compared with the prototypes to obtain template-prototype match scores. The probe is also compared with the prototypes, and those templates corresponding to template-prototype match scores that are nearest to probe-prototype match scores are selected as speaker-identity candidates. The speaker-identity candidates are ordered based on their similarity to the probe. | 04-26-2012 |
Jonathan Jeremiah Dinerstein, Draper, UT US
Patent application number | Description | Published |
---|---|---|
20140198982 | SYSTEM AND METHOD FOR RECOGNIZING OFFENSIVE IMAGES - According to one aspect, a method for categorizing at least one image includes obtaining the at least one image and mapping the at least one image to at least a first grid. The first grid is a two-dimensional grid that includes a plurality of cells. The method also includes characterizing the first grid, wherein categorizing the first grid includes determining whether the first grid is indicative of an offensive characteristic, and identifying the at least one image as offensive when it is determined that the first grid is indicative of the offensive characteristic. When it is determined that the first grid is not indicative of the offensive characteristic, the at least one image is identified as not offensive. | 07-17-2014 |
Joshua Dinerstein, West Valley, UT US
Patent application number | Description | Published |
---|---|---|
20090198724 | SYSTEM AND METHOD FOR CONDUCTING NETWORK ANALYTICS - A log file from a server is analyzed and entries in the log file are deleted, combined, or condensed to create a list of page views that more accurately reflects traffic to a server. The list of page views may be added to a database for searching, sorting, and analyzing the page views. | 08-06-2009 |
Joshua David Dinerstein, Draper, UT US
Patent application number | Description | Published |
---|---|---|
20140198982 | SYSTEM AND METHOD FOR RECOGNIZING OFFENSIVE IMAGES - According to one aspect, a method for categorizing at least one image includes obtaining the at least one image and mapping the at least one image to at least a first grid. The first grid is a two-dimensional grid that includes a plurality of cells. The method also includes characterizing the first grid, wherein categorizing the first grid includes determining whether the first grid is indicative of an offensive characteristic, and identifying the at least one image as offensive when it is determined that the first grid is indicative of the offensive characteristic. When it is determined that the first grid is not indicative of the offensive characteristic, the at least one image is identified as not offensive. | 07-17-2014 |
Joshua David Dinerstein, West Valley City, UT US
Patent application number | Description | Published |
---|---|---|
20100174862 | SYSTEMS AND METHODS FOR STORING AND ACCESSING DATA STORED IN A DATA ARRAY - Methods, systems, and apparatus for storing and accessing data stored in a data array are presented. In one embodiment, data is stored in a data array that includes a plurality of nodes. The nodes of the data array are segmented into one or more standard and priority pages. The pages are represented in a packed index. The priority pages are then cached and the standard pages are saved to disk. In another embodiment, data stored in a node of a data array may be accessed wherein the data array is segmented into at least one priority page and at least one standard page and the data array includes a plurality of nodes. A request for data stored in the node may be received. A priority page and/or a standard page may be searched for the node and, when found, the node may be accessed. | 07-08-2010 |
Rebecca Dinerstein, New York, NY US
Patent application number | Description | Published |
---|---|---|
20100089856 | Jar - A new jar has (among other features) at least two chambers separated by a fixed partition. Each chamber is at least as broad as it is deep and has an opening through which food that is dipped from the chamber can be removed. The two openings of the chambers face in opposite directions. And a lid covers each opening. | 04-15-2010 |
20100089857 | Jar - A new jar has (among other features) at least two chambers separated by a fixed partition. Each chamber is at least as broad as it is deep and has opening through which food that is dipped from the chamber can be removed. The two openings of the chambers face as opposite directions. And a lid covers each opening. | 04-15-2010 |
Sabra Dinerstein, Draper, UT US
Patent application number | Description | Published |
---|---|---|
20110150303 | STANDOFF AND MOBILE FINGERPRINT COLLECTION - A method, a biometric identifier collection device, and a set of instructions are disclosed. A memory | 06-23-2011 |
Sabra A. Dinerstein, Lehi, UT US
Patent application number | Description | Published |
---|---|---|
20100008550 | Method and apparatus for facial identification - Aspects of the disclosure can provide a face recognition method of increased robustness. The face recognition method can include receiving a target face image, initializing a registration and a block analysis of the target face image identifying one or more portions of the target face image for face recognition, informing a user of the registration and the block analysis, receiving one or more instructions from the user for operating on the registration and the block analysis, and identifying the target face image from a plurality of face images based on the registration and the block analysis of the target face image when the registration and the block analysis are approved by the user. | 01-14-2010 |
20120078886 | BIOMETRIC INDEXING AND SEARCHING SYSTEM - A prototype biometric identification system is disclosed that indexes a biometric corpus into indexed-corpuses using a set of P prototypes before searching for a probe in a search corpus constructed based on the indexed-corpus. The system may index the biometric corpus based on the prototypes directly or based on prototype-typicality scores. | 03-29-2012 |
Yosef Dinerstein, Haifa IL
Patent application number | Description | Published |
---|---|---|
20090199265 | ANALYTICS ENGINE - Aspects of the subject matter described herein relate to a mechanism for assessing security. In aspects, an analytics engine is provided that manages execution, information storage, and data passing between various components of a security system. When data is available for analysis, the analytics engine determines which security components to execute and the order in which to execute the security components, where in some instances two or more components may be executed in parallel. The analytics engine then executes the components in the order determined and passes output from component to component as dictated by dependencies between the components. This is repeated until a security assessment is generated or updated. The analytics engine simplifies the work of creating and integrating various security components. | 08-06-2009 |
20100241974 | Controlling Malicious Activity Detection Using Behavioral Models - Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets. | 09-23-2010 |
20130305374 | CONTROLLING MALICIOUS ACTIVITY DETECTION USING BEHAVIORAL MODELS - Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets. | 11-14-2013 |