Kosaraju
Chaitanya Kosaraju, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20140173307 | Interfacing Dynamic Hardware Power Managed Blocks and Software Power Managed Blocks - A method and apparatus for interfacing dynamic hardware power managed blocks and software power managed blocks is disclosed. In one embodiment, and integrated circuit (IC) may include a number of power manageable functional units. The functional units maybe power managed through hardware, software, or both. Each of the functional units may be coupled to at least one other functional unit through a direct communications link. A link state machine may monitor each of the communications links between functional units, and may broadcast indications of link availability to the functional units coupled to the link. Responsive to a software request to shut down a given link, or a hardware initiated shutdown of one of the functional units coupled to the link, the link state machine may broadcast and indication that the link is unavailable. | 06-19-2014 |
20160026234 | Interfacing Dynamic Hardware Power Managed Blocks and Software Power Managed Blocks - A method and apparatus for interfacing dynamic hardware power managed blocks and software power managed blocks is disclosed. In one embodiment, and integrated circuit (IC) may include a number of power manageable functional units. The functional units maybe power managed through hardware, software, or both. Each of the functional units may be coupled to at least one other functional unit through a direct communications link. A link state machine may monitor each of the communications links between functional units, and may broadcast indications of link availability to the functional units coupled to the link. Responsive to a software request to shut down a given link, or a hardware initiated shutdown of one of the functional units coupled to the link, the link state machine may broadcast and indication that the link is unavailable. | 01-28-2016 |
Hemanth Kosaraju, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20150031408 | System and Methods for Controlling Transmit Power on Multi-SIM Devices in Compliance with Specific Absorption Rate Limits - Methods and devices are disclosed for control total transmit power within specific absorption rate (SAR) limits when a multi-SIM wireless device, such as a dual-SIM dual active (DSDA) device, has two active data communications. Embodiment methods include determining a priority of at least one of two active data communications based upon a measured condition of the wireless device, and reducing transmit power on one of the two RF resources supporting one of the two active data communications with lower priority. To identify a higher or lower priority active data communication, characteristics of the communications or data may be used. | 01-29-2015 |
Praveen Kosaraju, New Castle, DE US
Patent application number | Description | Published |
---|---|---|
20120097612 | ORGANIC FLUID PERMEATION THROUGH FLUOROPOLYMER MEMBRANES - Separation of the components of liquid mixtures is achieved by contacting a liquid mixture with a nonporous membrane having a fluoropolymer selectively permeable layer and imposing a pressure gradient across the membrane from feed side to permeate side. Unusually high transmembrane flux is obtained when the membrane is subjected to one or more process conditions prior to separation. These include (a) leaving some residual amount of membrane casting solvent in the membrane, and (b) contacting the membrane with a component of the mixture to be separated for a duration effective to saturate the membrane with the component. | 04-26-2012 |
Praveen B. Kosaraju, Wilmington, DE US
Patent application number | Description | Published |
---|---|---|
20080197070 | Composite Membranes and Membrane Systems and Methods For Production and Utilization Thereof - Thin film composite membranes on polyolefin structures may be prepared by interfacial polymerization on a polyolefin support. Polyolefin structures may have hollow and/or solid portions. The polyolefin structure may be hydrophilized prior to interfacial polymerization. The hydrophilized structure may also be treated with an aqueous monomer containing solution first, followed by the organic monomer containing solution. Alternatively, an organic monomer solution may be introduced first, followed by the aqueous monomer containing solution when treating a hydrophilized structure. The formed membrane may possess advantageous characteristics, including stability, hydrophilicity, predetermined pore sizes and/or solvent resistance. | 08-21-2008 |
Prudhvi Kosaraju, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150242406 | METHOD AND SYSTEM FOR SYNCHRONIZING, ORGANIZING AND RANKING CONTACTS IN AN ELECTRONIC DEVICE - A method and a system for synching, organizing, and ranking user contacts by obtaining user contacts profile from various data sources are provided. The method includes identifying at least one data item associated with each contact from the plurality of data sources, wherein each data item comprises at least one of an attribute, and a sub-attribute, and computing a degree of similarity between each contact of the user and each other contact of the user using the at least one identified data item. | 08-27-2015 |
Ravi Kosaraju, Pittsford, NY US
Patent application number | Description | Published |
---|---|---|
20160094639 | ASSIGNING USER WORKLOADS TO APPLICATION SERVERS - A technique for assigning a user workload to an application server includes receiving a user request to initiate execution of a workload assigned to a user. An application server is selected, from among multiple application servers, to execute the workload based on compatibility between respective current states of the application servers and the workload. | 03-31-2016 |
Ravi K. Kosaraju, Middle Island, NY US
Patent application number | Description | Published |
---|---|---|
20090154701 | ON DEVICE NUMBER LOCK DRIVEN KEY GENERATION FOR A WIRELESS ROUTER IN WIRELESS NETWORK SECURITY SYSTEMS - The present invention solve the problems in the prior art by a embedding a number lock system on the router which serves as a input mechanism for entering the shared key or a shared seed which generates a shared key. A combination of numbers and letters may be used on the dials of the number lock. There is a slider to set the security protocol in use or turn it off. Once the user sets his key combination using the number lock on the device and sets a security mechanism he can go to his computer or a PDA or any device that supports Wi-Fi he will use the same mechanism that he does today with existing technology to enter the shared key and select the security mechanism. | 06-18-2009 |
20100095067 | Caching Web Page Elements In Accordance With Display Locations Of The Elements - Methods, apparatus, and products for caching web page elements in accordance with display locations of the elements, including maintaining, by a web browser in accordance with a cache retention policy, a local cache of previously displayed web page elements in dependence upon previous display locations of the elements including maintaining a cache retention score for each locally cached element; and displaying, by the web browser, a previously displayed web page including displaying one or more of the locally cached elements. | 04-15-2010 |
20100317304 | Enhanced Radio - A system and method of controlling a portable radio may involve tuning a first receiver of the portable radio to a first broadcast from a first station, where the first broadcast includes specific program content. A switching event can be detected at the portable radio, where a second receiver of the portable radio may be tuned to a second broadcast from a second station in response to the switching event. The second broadcast can include the specific program content. | 12-16-2010 |
Ravi K. Kosaraju, Johnston, RI US
Patent application number | Description | Published |
---|---|---|
20110142218 | ENHANCED PRIVACY CALLER IDENTIFICATION SYSTEM - A first telephone number assigned to the first telephone is cryptographically hashed to generate a first message digest, and the first telephone sends a signal to a second telephone over a communication network, wherein the signal includes the first message digest. The second telephone receives the first signal and searches its contact records to determine whether a telephone number in one of the contact records generates a message digest that matches the message digest received. Then, in response to the second telephone determining that a telephone number in one of the contact records generates a message digest that matches the first message digest, the second telephone identifies the contact record that generates the matching message digest and provides audible or visual output of content from the identified contact record. | 06-16-2011 |
20120005260 | Method for Optimizing Remote Object Implementations - A method, system and computer-usable medium are disclosed for reducing overhead associated with exporting remote objects. A session context is generated when a remote or local session is respectively established by a remote or local client with a bootstrap remote object. The session context is then determined to be either remote or local and marked accordingly. If the session context is marked as remote, then the bootstrap remote object is exported as remote objects. However, if the session context is marked as local, then the bootstrap remote object is not exported as remote objects. Instead, they are provided for use by the local client as non-exported remote objects. | 01-05-2012 |
20120197925 | Optimization of Database Driver Performance - Memory usage of a database driver is reduced by accessing database elements from a database object within a database during a database operation, generating an element object for each different value of accessed database elements, where the database object includes at least two database elements having the same unique value such that a total number of accessed database elements is greater than a total number of generated element objects, storing the generated element objects in a storage structure, and providing the generated element objects from the storage structure within results for the database operation. | 08-02-2012 |
20140109065 | IDENTIFYING ERRORS USING CONTEXT BASED CLASS NAMES - A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object. | 04-17-2014 |
20140189526 | CHANGING LOG FILE CONTENT GENERATION - In a method for changing log file content generation, a computer extracts content of a log file. The content was generated by one or more computer programs at run-time. The content comprises a plurality of portions. The computer causes the extracted content to be displayed in a user interface. The computer detects a user interaction in the user interface. The user interaction manipulates at least one of the portions. The computer generates a rule for generating future log file content, wherein the generated rule is based on the user interaction in the user interface. | 07-03-2014 |
Ravi K. Kosaraju, Pittsford, NY US
Patent application number | Description | Published |
---|---|---|
20140089025 | AUTHENTICATING A RESPONSE TO A CHANGE REQUEST - A method to authenticate an identity of a responder. The method includes receiving a request and determining, by one or more computer processors, a reviewer for the request. A custom key is generated for the reviewer and the request, and at least one URL is generated that contains the custom key. At least one URL is sent, along with the request, to the reviewer. Upon receiving a response to the request that includes a selection of one URL, it is determined whether the response was received from the determined reviewer for the request. | 03-27-2014 |
20150121463 | AUTHORIZING A CHANGE WITHIN A COMPUTER SYSTEM - Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change. | 04-30-2015 |
Ravi Krishna Kosaraju, Johnston, RI US
Patent application number | Description | Published |
---|---|---|
20110218773 | SYSTEM AND METHOD FOR POSITIONING AND CONTROLLING AIR CONDITIONING TILES FOR OPTIMAL COOLING USING VORONOI DIAGRAMS - A system and method is disclosed that utilizes a Voronoi diagram to position and/or control perforated ventilation tiles in rooms of equipment requiring cooling air. The Voronoi sites used for constructing the Voronoi diagram are the air inlets of the equipment, and the Voronoi edges of the computed Voronoi diagram are used as the locations for placing (or controlling) perforated tiles. | 09-08-2011 |
Ravi Krishna Kosaraju, Middle Island, NY US
Patent application number | Description | Published |
---|---|---|
20090136142 | MEMORY OPTIMIZED CACHE GENERATION FOR IMAGE TILING IN GIS/CAD BROWSER APPLICATIONS - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for generating tile sizes associated with an image presented by a web based image system. An optimal threshold memory size for tiles associated with the image is identified. The image is then divided into tiles of equal physical dimensions and placed into a set of subdivided tiles. The memory size of each tile within the set of subdivided tiles is compared to the threshold memory size. Tiles having a memory size less than or equal to the threshold memory size are deleted from the set of subdivided tiles and stored. Tiles having a memory size greater than the threshold memory size are subdivided into tiles of smaller physical dimensions. The smaller tiles are placed back in the set of subdivided tiles. The process repeats until no tiles exist within the set of subdivided tiles. | 05-28-2009 |
Sreenivas Kosaraju, Beaverton, OR US
Patent application number | Description | Published |
---|---|---|
20130292835 | CONFORMAL LOW TEMPERATURE HERMETIC DIELECTRIC DIFFUSION BARRIERS - Conformal hermetic dielectric films suitable as dielectric diffusion barriers over 3D topography. In embodiments, the dielectric diffusion barrier includes a dielectric layer, such as a metal oxide, which can be deposited by atomic layer deposition (ALD) techniques with a conformality and density greater than can be achieved in a conventional silicon dioxide-based film deposited by a PECVD process for a thinner contiguous hermetic diffusion barrier. In further embodiments, the diffusion barrier is a multi-layered film including a high-k dielectric layer and a low-k or intermediate-k dielectric layer (e.g., a bi-layer) to reduce the dielectric constant of the diffusion barrier. In other embodiments a silicate of a high-k dielectric layer (e.g., a metal silicate) is formed to lower the k-value of the diffusion barrier by adjusting the silicon content of the silicate while maintaining high film conformality and density. | 11-07-2013 |