Kannan
Kannan Achan, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20080320119 | Automatically identifying dynamic Internet protocol addresses - Dynamic IP addresses may be automatically identified and their dynamics patterns may be analyzed. Multi-user IP address blocks are determined as candidates for further analysis. An entropy score is determined for each IP address in every candidate block to distinguish between a dynamic IP and a static IP shared by multiple users. IP addresses with high entropy scores are grouped, and then analyzed, and may be used in various applications, such as spam filtering. | 12-25-2008 |
20090076794 | ADDING PROTOTYPE INFORMATION INTO PROBABILISTIC MODELS - Mechanisms are disclosed for incorporating prototype information into probabilistic models for automated information processing, mining, and knowledge discovery. Examples of these models include Hidden Markov Models (HMMs), Latent Dirichlet Allocation (LDA) models, and the like. The prototype information injects prior knowledge to such models, thereby rendering them more accurate, effective, and efficient. For instance, in the context of automated word labeling, additional knowledge is encoded into the models by providing a small set of prototypical words for each possible label. The net result is that words in a given corpus are labeled and are therefore in condition to be summarized, identified, classified, clustered, and the like. | 03-19-2009 |
20090228353 | QUERY CLASSIFICATION BASED ON QUERY CLICK LOGS - Methods are provided for the classification of search engine queries and associated documents based on search engine query click logs. One or more seed documents or queries are provided that contain content that is representative of a category. A query click log containing information regarding queries entered by at least one user into the search engine and documents subsequently clicked in search engine results corresponding with the queries is analyzed to determine which one or more queries resulted in clicks on the seed documents. Information is stored associating the one or more queries with the category if they resulted in clicks on the seed documents. | 09-10-2009 |
20090254989 | CLUSTERING BOTNET BEHAVIOR USING PARAMETERIZED MODELS - Identification and prevention of email spam that originates from botnets may be performed by finding similarity in their host property and behavior patterns using a set of labeled data. Clustering models of host properties pertaining to previously identified and appropriately tagged botnet hosts may be learned. Given labeled data, each botnet may be examined individually and a clustering model learned to reflect upon a set of selected host properties. Once a model has been learned for every botnet, clustering behavior may be used to look for host properties that fit into a profile. Such traffic can be either discarded or tagged for subsequent analysis and can also be used to profile botnets preventing them from launching other attacks. In addition, models of individual botnets can be further clustered to form superclusters, which can help understand botnet behavior and detect future attacks. | 10-08-2009 |
20090265786 | AUTOMATIC BOTNET SPAM SIGNATURE GENERATION - A framework may be used for generating URL signatures to identify botnet spam and membership. The framework may take a set of unlabeled emails as input that are grouped based on URLs contained within the emails. The framework may return a set of spam URL signatures and a list of corresponding botnet host IP addresses by analyzing the URLs within the emails that are contained within the groups. Each URL signature may be in the form of either a complete URL string or a URL regular expression. The signatures may be used to identify spam emails launched from botnets, while the knowledge of botnet host identities can help filter other spam emails also sent by them. | 10-22-2009 |
20110246286 | CLICK PROBABILITY WITH MISSING FEATURES IN SPONSORED SEARCH - Sponsored search advertising utilizes a click probability as one factor in selecting and ranking advertisements that are displayed with search results. The probability of click may also be referred to as a predicted click-through rate (“CTR”) that may be multiplied by an advertiser's bid for a particular advertisement to rank the display of advertisements. An accurate prediction of the click probability improves the potential revenue that is generated by advertisements in a pay per click system. Other advertising systems may benefit from an accurate and reliable estimate for an advertisement's probability of click in different environments and scenarios. | 10-06-2011 |
20120022952 | Using Linear and Log-Linear Model Combinations for Estimating Probabilities of Events - A method for combining multiple probability of click models in an online advertising system into a combined predictive model, the method commencing by receiving a feature set slice (e.g. corresponding to demographics or taxonomies or clusters), and using the sliced data for training multiple slice-wise predictive models. The trained slice-wise predictive models are combined by overlaying a weighted distribution model over the trained slice-wise predictive models. The combined predictive model then is used in predicting the probability of a click given a query-advertisement pair in online advertising. The method can flexibly receive slice specifications, and can overlay any one or more of a variety of distribution models, such as a linear combination or a log-linear combination. Using an appropriate weighted distribution model, the combined predictive model reliably yields predictive estimates of occurrence of click events that are at least as good as the best predictive model in the slice-wise predictive model set. | 01-26-2012 |
20120136722 | Using Clicked Slate Driven Click-Through Rate Estimates in Sponsored Search - A computer-implemented method and system for selecting a subject advertisement in a sponsored search system based on a user's commercial intent (pertaining to the subject advertisement), using techniques for determining intent-driven clicks from a historical database. The method includes steps for aggregating a training model dataset wherein the training model dataset contains a selected history of clicks. Then, selecting from the training model dataset, a clicked slate (further selection of clicks), the clicked slate comprising a set of clicked ads, and calculating an intent-driven click feedback value for the subject advertisement. The method includes techniques for selecting a clicked slate using features corresponding to clicks received within a particular time period (the time period determined statically or dynamically). A system for implementing the method includes aggregating data from a historical database using selectors such as a position selector, a click feature selector, an impression-advertiser-campaign-creative selector, and a commercial intent selector. | 05-31-2012 |
20130275235 | USING LINEAR AND LOG-LINEAR MODEL COMBINATIONS FOR ESTIMATING PROBABILITIES OF EVENTS - A system for determining predictive models associated with online advertising can include a communications interface, a processor, and a display. The communications interface can be configured to receive a partial dataset. The partial dataset may include user information. The processor can be communicatively coupled to the communications interface and configured to identify the partial dataset. The processor can also be configured to determine a first predictive model corresponding to at least part of the partial dataset and a second predictive model by combining a probability distribution with the first predictive model. The display can be communicatively coupled to the processor and configured to display the second predictive model. | 10-17-2013 |
20140358730 | Systems And Methods For Optimally Ordering Recommendations - Example systems and methods for optimally ordering recommendations or search results are described. In one implementation, a method determines a set of items as search results or candidates for recommendation. Each of the items in the set is associated with a respective first parameter representative of a measure of suitability of the respective item for recommendation. The items in the set are associated with a plurality of second parameters each of which representative of a measure of similarity between a respective one of the items and another respective one of the items. The method also determines an order in which a subset of the items is to be displayed based at least in part on the representative first parameter and the representative set of second parameters associated with the items. The method further displays the subset of the items in the determined order. | 12-04-2014 |
20140358742 | Systems And Methods For Mapping In-Store Transactions To Customer Profiles - Example systems and methods for mapping in-store transactions to customer profiles are described. In one implementation, a method receives information of a plurality of customer profiles of a plurality of online customers. Each of the customer profiles includes a plurality of types of attributes associated with a respective one of the online customers. The types of attributes include a first type of attribute. The method also receives information of a plurality of in-store transactions by a plurality of in-store customers. The information of each of the in-store transactions includes the first type of attribute associated with the respective in-store customer. The method further maps, for at least one of the in-store customers, one or more of the customer profiles of online customers to the at least one of the in-store customers based at least in part on the first type of attribute. | 12-04-2014 |
20140358771 | SYSTEMS AND METHODS FOR CLUSTERING OF CUSTOMERS USING TRANSACTION PATTERNS - Example systems and methods for clustering of customers using patterns in their transactions are described. In one implementation, a method receives customer information that includes at least a plurality of customer identifications and a plurality of payment options associated with a plurality of customers. The method identifies a subset of payment options, from among the payment options, and a subset of customer identifications, from among the customer identifications, such that each payment option of the subset of payment options is associated with more than one customer identification of the subset of customer identifications. The method then classifies each customer identification of the subset of customer identifications as either of one of more than one of the customer identifications associated with a single one of the customers or one of more than one of the customer identifications associated with more than one of the customers who are related to each other. | 12-04-2014 |
Kannan Allampalayam Jayaraman, Albany, NY US
Patent application number | Description | Published |
---|---|---|
20140206796 | BLOWABLE INSULATION MATERIAL WITH ENHANCED DURABILITY AND WATER REPELLENCY - A blowable insulation material comprising natural fibers and short cut synthetic fibers or fiber balls. The natural fibers and short cut synthetic fibers or fiber balls are individually treated with a water repellent to impart water repellency to the fibers, and later aerodynamically blended together. The water repellent fibers constitute a part or most of the blowable insulation material, thus enhancing the durability of the structure as well as water repellency, which may be advantageous during washing or laundering. | 07-24-2014 |
Kannan Amaresh, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090030761 | PREDICTING FINANCIAL IMPACT OF BUSINESS FRAMEWORK - The financial impact of the implementation of a business framework can be predicted. Shifted business condition metrics associated with business activities for implementing the business framework can be applied to model financial impact for a business entity. Impact on financial condition according to income statement and balance sheet can be modeled based on financial data for the business entity. Impact can be modeled per activity. Activities can be prioritized based on modeled impact. | 01-29-2009 |
Kannan Avudai, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20150234842 | Mapping of Extensible Datasets to Relational Database Schemas - Data including a text file is received. The text file is arranged in an extensible format and includes a plurality of metadata lines, a header line, and a plurality of content lines. Metadata from the metadata lines is mapped to a plurality of metadata tables in a database that are formed according to a relational database schema using prefix parameters from each metadata line. Content from the content lines is mapped to a plurality of content tables in the database that are formed according to the relational database schema using the header line. A first subset of the content tables have a static structure and a second subset of the content tables have a dynamic structure. Related apparatus, systems, techniques and articles are also described. | 08-20-2015 |
20150234870 | DYNAMIC MAPPING OF EXTENSIBLE DATASETS TO RELATIONAL DATABASE SCHEMAS - A text file is received. The text file is arranged in an extensible format and includes a plurality of metadata lines, a header line, and a plurality of content lines. Keys are retrieved from the content lines. For each key, a data type and a number from at least one metadata table is retrieved. Using a combination of each key and the corresponding data type and number, a column title is derived. Upon verification that the derived column title does not already exist, a column for each key is generated in a content table having a dynamic structure in a relational database schema. The column has the derived column title, a column type based on the corresponding retrieved data type, and the number of generated columns determined by the corresponding retrieved number. The retrieved value is mapped into the column associated with the corresponding key. | 08-20-2015 |
Kannan Iyer, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20150317562 | AUTOMATIC MODERATION OF ONLINE CONTENT - Techniques are disclosed for automatically modeling and predicting moderator actions for online content. A model can be generated or updated based on the content received and the action or actions taken by the moderator in response to receiving the content. The model can be used to automatically predict which action, or combination of actions, are likely to be taken by the moderator when new content is received, and suggest those action(s) to the moderator. These suggestions can, among other things, simplify and speed up the decision-making process for the moderator. | 11-05-2015 |
20150371341 | MANAGING SOCIAL FEED ASSIGNMENT - Moderation of social content is facilitated by the generation and assignment of social feeds to moderators. An admin tool may allow an administrator to generate a social feed by defining capture rules to capture social mentions from social networking services. The administrator may also select the social networking services for the social feed. The social feed may be assigned to moderators and/or moderator groups such that the social feed and the social mentions from the social feed appear in the moderation tools of the assigned moderators. The admin tool may also allow the administrator to further manage social feeds by unassigning moderators, modifying social feeds, deleting social feeds, and controlling privileges of moderators for social feeds. | 12-24-2015 |
Kannan Kariraman, Chennai IN
Patent application number | Description | Published |
---|---|---|
20140095931 | Method and system for automating the process of testing a device - Device Test Automation framework. This embodiment provides a device test automation framework for automating testing of embedded systems. The device test automation framework—DTAF allows user to test embedded device software using test scripts, which can capture various interfaces of device under test. A Graphical User Interface—GUI tool is created based on device under test configuration and user input. This GUI tool shows various interface of device under test. A device test automation framework hardware enables communication between test tool and the device under test. DTAF allows testing process to dramatically improve productivity, effectiveness, efficiency and coverage of embedded software testing | 04-03-2014 |
Kannan Kathirvel, Tamil Nadu IN
Patent application number | Description | Published |
---|---|---|
20160063869 | SYSTEM AND METHOD FOR DISPLAYING TRAFFIC AND ASSOCIATED ALERTS ON A THREE-DIMENSIONAL AIRPORT MOVING MAP DISPLAY - A flight deck display system and method comprises a first source of host aircraft feature data and a second source of traffic data. A processor is coupled to the first and second sources and is configured to (a) receive host aircraft data; (2) receive traffic data; (3) filter traffic based on a predetermined set of separation criteria to identify vital traffic; (4) generate symbology graphically representative of vital traffic; (5) generate symbology graphically representative of the host aircraft; and (6) display the host aircraft and the vital traffic on an AMM display. | 03-03-2016 |
20160083118 | METHOD AND SYSTEM FOR PREPARING AIRCRAFT MAINTENANCE APPLICATION DATA FOR PORTABLE DEVICES - Embodiments of the subject matter described herein relate generally to preparing aircraft maintenance application data for retrieval by portable devices. The method or system encompasses different components of the aircraft maintenance domain and meets the requirements of multiple stakeholders each seeking a customized record of aircraft maintenance application data. The method or system is also capable of expansion to support future requirements. | 03-24-2016 |
Kannan Katturaja, Tuticorin IN
Patent application number | Description | Published |
---|---|---|
20140234675 | A POWER PACK SYSTEM AND A VENTILATION SYSTEM PROVIDED THEREIN - A power pack system includes an energy storage system having a plurality of energy storage devices and a thermal management system. The thermal management system includes a battery ventilation system connected to energy storage system for achieving and maintaining a predetermined temperature within energy storage system by providing a two way circulation of a working fluid. Further, the system includes a housing having a top cover and a bottom cover to receive and secure the energy storage devices therein. The top cover and bottom cover configured to retain said energy storage devices in a sealable manner. Further, a method for achieving and maintaining a pre determined temperature within an energy storage system includes providing two way circulation of a working fluid and maintaining a uniform flow velocity of the fluid at least inside the energy storage system. | 08-21-2014 |
Kannan Konath, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20120259779 | SYSTEM AND METHOD FOR CASHLESS PEER-TO-PEER PAYMENT - Embodiments of the present invention provide a method for a server performing a wireless payment transaction, comprising: providing a server web page or native application including options for a user selecting a role as payer or payee; requesting information from the payee including a transaction ID provided by the server; requesting information from the payer including the transaction ID; initiating an authorization of the transaction on a credit or debit account of the payer; initiating a transaction to credit the payee's account; and completing the transaction with the payer by initiating the offline clearing of the transaction. | 10-11-2012 |
20120284193 | SYSTEM AND METHOD FOR SECURE COMMUNICATION FOR CASHLESS TRANSACTIONS - Embodiments of the present invention provide a system and method for an access point providing client to point-of-sale communication over a network, comprising: receiving credentials from the point-of-sale; sending at least one beacon message; receiving a probe request from a client; sending a probe response to the client; authenticating a connection with the client: exchanging capabilities with the client; performing a security handshake with the client; assigning at least one dynamic IP address to the client; and establishing an https session between the client and the point-of-sale over the network. | 11-08-2012 |
Kannan Muthukkaruppan, Union City, CA US
Patent application number | Description | Published |
---|---|---|
20140188825 | PLACEMENT POLICY - A region-based placement policy that can be used to achieve a better distribution of data in a clustered storage system is disclosed herein. The clustered storage system includes a master module to implement the region-based placement policy for storing one or more copies of a received data across many data nodes of the clustered storage system. When implementing the region-based placement policy, the master module splits the received data into one or more regions, where each region includes a contiguous portion of the received data. Further, for each of the plurality of regions, the master module stores complete copies of the region in a subset of the data nodes. | 07-03-2014 |
Kannan Neelakanta, Chennai IN
Patent application number | Description | Published |
---|---|---|
20140336502 | DEVICE WITH SIMULTANEOUS X-RAY AND INFRARED IMAGE ACQUISITION AND PROCESSING SYSTEM FOR ENHANCED BREAST IMAGING - The embodiments herein discloses a device with simultaneous X-ray and infrared acquisition and processing systems for an enhance breast imaging. The device has a positioning assembly housed inside a closed chamber and provided with the Infrared and X-ray imaging systems to simultaneously capture an infra red image and an X-ray image of the breast under examination. A patient support table with an opening is provided to enable a patient to lie in a prone position without compressing a breast during imaging. The device is used to correlate anatomical and physiological characteristics and post process analysis of a breast tissue thereby reducing a number of to false positive results. Further the device helps in focusing on a suspected area in a follow-up procedure and aids post processing treatment like targeted biopsy and targeted radiation. | 11-13-2014 |
Kannan Pichai, Monmouth Junction, NJ US
Patent application number | Description | Published |
---|---|---|
20130173437 | Liquidity Assessment System - In some embodiments, a liquidity assessment system comprises a memory and a processor communicatively coupled to the memory. The memory is operable to store financial environment data, financial liquidity data for a financial enterprise, and financial scenario data. The processor is configured to generate a scenario financial environment by applying the financial scenario data to the financial environment data, determine scenario liquidity positions for each financial entity within a financial enterprise, and compare the scenario liquidity positions with liquidity requirements of jurisdictions governing the financial entities. | 07-04-2013 |
Kannan Sasi, Pelham, NH US
Patent application number | Description | Published |
---|---|---|
20160048351 | MULTI-THREADED TRANSACTION LOG FOR PRIMARY AND RESTORE/INTELLIGENCE - A unified system provides primary storage and in-line analytics-based data protection. Additional data intelligence and analytics gathered on protected data and prior analytics are stored in discovery points. The disclosed system implements multi-threaded log writes across primary and restore nodes with write gathering across file systems; nested directories such as may be used for storing virtual machine files, where every subdirectory has an associated file system for snapshot purposes; and cloning objects on demand with background metadata and data migration. | 02-18-2016 |
20160048427 | VIRTUAL SUBDIRECTORY MANAGEMENT - A unified system provides primary storage and in-line analytics-based data protection. Additional data intelligence and analytics gathered on protected data and prior analytics are stored in discovery points. The disclosed system implements multi-threaded log writes across primary and restore nodes with write gathering across file systems; nested directories such as may be used for storing virtual machine files, where every subdirectory has an associated file system for snapshot purposes; and cloning objects on demand with background metadata and data migration. | 02-18-2016 |
Kannan Sasi, Nashua, NH US
Patent application number | Description | Published |
---|---|---|
20140281690 | Automatic Failure Recovery Using Snapshots and Replicas - In one embodiment, a method of coordinating data recovery in a storage stack with a hierarchy of layers includes, upon an input/output (I/O) request from a layer of the stack, issuing a help response to recover the data from a higher layer in hierarchy order. The method further includes processing the help response, at the higher layer, by issuing a return code of success or further help response to an even higher layer. | 09-18-2014 |
20150309887 | Automatic Failure Recovery Using Snapshots and Replicas - In one embodiment, a method of data recovery in a storage system includes, upon failure to fulfill an I/O request for requested data to a primary volume, consulting a change set to determine whether the requested data are current in a snapshot or replica. Further, such an embodiment includes providing the requested data using the snapshot or replica without further accessing the change set, if the requested data are current in the snapshot or replica, or issuing an error or failure status, if the requested data are not current. | 10-29-2015 |
Kannan Soundarapandian, Murphy, TX US
Patent application number | Description | Published |
---|---|---|
20130221342 | OVERVOLTAGE TESTING APPARATUS - An apparatus is provided. In the apparatus, there is comprises a substrate with a first region of a first conductivity type, a second region of a second conductivity type that is substantially surrounded by the first region, and a third region of the second conductivity type that is substantially surrounded by the second region. A first dielectric layer is formed over the substrate, and a first conductive layer is formed over the first dielectric layer, which is configured to form a first electrode of a capacitor. A second dielectric layer is formed over the first conductive layer. A plate is formed over the second dielectric layer so as to form a second electrode of the capacitor. A cap is formed over the second dielectric layer, being spaced apart from the plate. A via is electrically coupled to the cap and the third region, extending through the first and second dielectric layers. | 08-29-2013 |
Kannan Srinivasagam, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130076375 | CAPACITANCE SENSING CIRCUITS, METHODS AND SYSTEMS HAVING CONDUCTIVE TOUCH SURFACE - A capacitance sense device can include a plurality of sense electrodes; a nonconductive structure comprising first regions formed over the sense electrodes and second regions formed between first regions that are less compressible than the first regions; a conductive touch surface formed over the nonconductive structure; and a capacitance sense circuit coupled to at least the sense electrodes. | 03-28-2013 |
Kannan Sundaravadivelu, Singapore SG
Patent application number | Description | Published |
---|---|---|
20150146322 | DATA STORAGE DEVICE - According to an embodiment of the present invention, a data storage device comprising a motor having a stator is disclosed. The stator may include a substrate having a first surface and a second surface opposite to the first surface; and a n-phase winding arrangement having n phase windings; wherein each phase winding comprises m flat fractional-pitch coils arranged on the first surface of the substrate such that the coils are spaced apart uniformly along a closed loop and connected in series; wherein each coil together with an angular section of the substrate between the coil and an adjacent coil of the same phase winding defines a stator pole-pair; and wherein m is an integer larger than 1. | 05-28-2015 |
Kannan Tarakad, Belmont, CA US
Patent application number | Description | Published |
---|---|---|
20140095249 | SUPPLY CHAIN ORCHESTRATION SYSTEM WITH ORCHESTRATION, CHANGE MANAGEMENT AND INTERNAL MATERIAL TRANSFER FLOW - A system is provided that orchestrate a supply chain orchestration process. The system receives a supply request and creates a supply order. The system further selects a supply chain orchestration process for the supply order, where the supply chain orchestration process includes one or more steps. The system further generates an executable supply chain orchestration process. The system further executes the executable supply chain orchestration process to generate one or more supply tasks that are defined by the one or more steps of the supply chain orchestration process. The system further sends the one or more supply tasks to one or more external supply execution systems. The system further receives one or more status values from the one or more external supply execution systems. The system further generates an overall status value for the supply chain orchestration process based on the one or more status values. | 04-03-2014 |
20140282394 | INVOCATION OF EXTERNAL WEB SERVICES USING DYNAMICALLY GENERATED COMPOSITE APPLICATIONS - A system is provided that invokes an external web service using a composite application. The system creates a composite application definition, where the composite application definition includes external web service information and a mapping of a task operation to a service operation. The system further dynamically generates the composite application based on the composite application definition, where the composite application includes computer code. The system further deploys the composite application. | 09-18-2014 |
Kannan Thanukrishnan, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140113321 | IDENTIFICATION OF CELLULOLYTIC MICROORGANISM CONTAMINATION IN FOOD AND OTHER MATERIALS - Compositions, kits, and methods for detecting cellulolytic microorganisms in a sample are disclosed herein. In some embodiments cellulolytic microorganisms are detected by detecting the presence of a secreted enzyme, such as but not limited to cellobiohydrolase. | 04-24-2014 |
Kannan Tharakaraman, Arlington, MA US
Patent application number | Description | Published |
---|---|---|
20120213819 | HEMAGGLUTININ POLYPEPTIDES, AND REAGENTS AND METHODS RELATING THERETO - The present invention provides a system for analyzing interactions between glycans and interaction partners that bind to them. The present invention also provides HA polypeptides that bind to umbrella-topology glycans, and reagents and methods relating thereto. | 08-23-2012 |
20130302348 | AGENTS FOR INFLUENZA NEUTRALIZATION - The present invention provides antibodies (e.g., monoclonal antibodies, human antibodies, humanized antibodies, etc.), which bind to multiple influenza strains. Such antibodies are useful, for example, in the prophylaxis, treatment, diagnosis, and/or study of influenza. | 11-14-2013 |
20140056913 | ANTI-DENGUE VIRUS ANTIBODIES AND USES THEREOF - The present invention provides, among other things, antibody agents (e.g., antibodies, and/or antigen-binding fragments thereof) that bind to DV epitopes, as well as compositions containing them and methods of designing, providing, formulating, using, identifying and/or characterizing them. In some embodiments, provided antibody agents show significant binding to a plurality of DV serotypes. In some embodiments, provided antibody agents show significant binding to all four DV serotypes. Such antibody agents are useful, for example, in the prophylaxis, treatment, diagnosis, and/or study of DV. | 02-27-2014 |
20140335504 | HUMAN ADAPTATION OF H5 INFLUENZA - The present invention provides, among other things, technologies and methodologies for detection, treatment, and/or prevention of influenza transmission and/or infection. The present invention also provides technologies for monitoring influenza HA variants with particular degrees of susceptibility to mutation for human adaptation. | 11-13-2014 |
20150368321 | NOVEL FULL SPECTRUM ANTI-DENGUE ANTIBODY - The present invention provides, among other things, antibody agents (e.g., antibodies, and/or antigen-binding fragments thereof) that bind to DV epitopes, as well as compositions containing them and methods of designing, providing, formulating, using, identifying and/or characterizing them. In some embodiments, provided antibody agents show significant binding to a plurality of DV serotypes. In some embodiments, provided antibody agents show significant binding to all four DV serotypes. Such antibody agents are useful, for example, in the prophylaxis, treatment, diagnosis, and/or study of DV. | 12-24-2015 |
20160075742 | HUMAN ADAPTATION OF H3 INFLUENZA - The present invention provides, among other things, technologies and methodologies for detection, treatment, and/or prevention of influenza transmission and/or infection. The present invention also provides technologies for monitoring influenza variants for their potential to present a pandemic risk to humans. | 03-17-2016 |
Kannan Varadhan, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20100043067 | SCALABLE SECURITY SERVICES FOR MULTICAST IN A ROUTER HAVING INTEGRATED ZONE-BASED FIREWALL - A multicast-capable firewall allows firewall security policies to be applied to multicast traffic. The multicast-capable firewall may be integrated within a routing device, thus allowing a single device to provide both routing functionality, including multicast support, as well as firewall services. The routing device provides a user interface by which a user specifies one or more zones to be recognized by the integrated firewall when applying stateful firewall services to multicast packets. The user interface supports a syntax that allows the user to define subsets of the plurality of interfaces associated with the zones, and define a single multicast policy to be applied to multicast sessions associated with a multicast group. The multicast policy identifies common services to be applied pre-replication, and exceptions specifying additional services to be applied post-replication to copies of the multicast packets for the one or more zones. | 02-18-2010 |
20100043068 | ROUTING DEVICE HAVING INTEGRATED MPLS-AWARE FIREWALL - An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual security systems. The routing device provides a user interface by which a user specifies one or more zones to be recognized by the integrated firewall when applying stateful firewall services to the packets. The user interface allows the user to define different zones and policies for different ones of the virtual security systems. In addition, the user interface supports a syntax that allows the user to define the zones for the firewall by specifying the customer VPNs as interfaces associated with the zones. The routing device generates mapping information for the integrated firewall to map the customer VPNs to specific MPLS labels for the MPLS tunnels carrying the customer's traffic. | 02-18-2010 |
20120113857 | DYNAMIC MONITORING OF NETWORK TRAFFIC - A device, connected to a monitoring appliance, may include a traffic analyzer to receive a data unit and identify a traffic flow associated with the data unit. The device may also include a traffic processor to receive the data unit and information regarding the identified traffic flow from the traffic analyzer, determine that the identified traffic flow is to be monitored by the monitoring appliance, change a port number, associated with the data unit, to a particular port number to create a modified data unit when the identified traffic flow is to be monitored by the monitoring appliance, and send the modified data unit to the monitoring appliance. | 05-10-2012 |
20130074177 | ROUTING DEVICE HAVING INTEGRATED MPLS-AWARE FIREWALL - An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual security systems. The routing device provides a user interface by which a user specifies one or more zones to be recognized by the integrated firewall when applying stateful firewall services to the packets. The user interface allows the user to define different zones and policies for different ones of the virtual security systems. In addition, the user interface supports a syntax that allows the user to define the zones for the firewall by specifying the customer VPNs as interfaces associated with the zones. The routing device generates mapping information for the integrated firewall to map the customer VPNs to specific MPLS labels for the MPLS tunnels carrying the customer's traffic. | 03-21-2013 |
20140237541 | SCALABLE SECURITY SERVICES FOR MULTICAST IN A ROUTER HAVING INTEGRATED ZONE-BASED FIREWALL - A multicast-capable firewall allows firewall security policies to be applied to multicast traffic. The multicast-capable firewall may be integrated within a routing device, thus allowing a single device to provide both routing functionality, including multicast support, as well as firewall services. The routing device provides a user interface by which a user specifies one or more zones to be recognized by the integrated firewall when applying stateful firewall services to multicast packets. The user interface supports a syntax that allows the user to define subsets of the plurality of interfaces associated with the zones, and define a single multicast policy to be applied to multicast sessions associated with a multicast group. The multicast policy identifies common services to be applied pre-replication, and exceptions specifying additional services to be applied post-replication to copies of the multicast packets for the one or more zones. | 08-21-2014 |
20150109931 | FLOW CONTROL SCHEME FOR PARALLEL FLOWS - A method includes a proxy device receiving from a source device a request to establish a flow to a destination device; generating, based on the request, a meta-packet that indicates that the flow to the destination device is to be proxied; determining whether a pre-established flow connecting the proxy device to another proxy device that leads toward the destination device exists; sending the meta-packet on the pre-established flow, when it is determined that the pre-established flow exists; receiving by the other proxy device, the meta-packet, and establishing the flow to the destination device based on the meta-packet, where the proxy devices assign one or more of a source address, a source port, a destination address, or a destination port, associated with the source device and the destination device, to the pre-established flow. | 04-23-2015 |
Kannan Vidhya, Bangalore, IN US
Patent application number | Description | Published |
---|---|---|
20110301998 | MANAGING A NETWORK SYSTEM - Managing a network system includes determining metrics for a plurality of nodes in the network system, determining a plurality of zones including the plurality of nodes based on the metrics for the network system, and, for each zone of the plurality of zones, determining a computational architecture to be implemented for the zone based on the metrics for each node of the plurality of nodes in the zone. | 12-08-2011 |
Kannan Vijayan, Toronto CA
Patent application number | Description | Published |
---|---|---|
20120117298 | Managing Memory Across a Network of Cloned Virtual Machines - A method and system manages memory in a network of virtual machines, including a copy of a master virtual machine (VM) memory system, the copy accessible to a memory server. The method includes determining whether a memory page requested by a clone VM memory system is fetchable from the memory server, the clone VM memory system hosted in a host memory system; if the memory page is fetchable from the memory server, fetching the memory page from the memory server; determining whether there is sufficient space in the host memory system to load the memory page; if there is insufficient space in the host memory system, evicting a selected memory page from the host memory system; and loading the memory page into the host memory system and the clone VM memory system. | 05-10-2012 |
Kannan Vivekanandan, Gaziabad IN
Patent application number | Description | Published |
---|---|---|
20080207935 | Process for the Preparation of an Anti-Tumor Platinum (II) - Complex - We disclose here processes for making Platinum complex of general formula (I) where in, the conformation of 1,2-diaminocyclohexane is cis, trans-l or trans-d isomer and R | 08-28-2008 |