Patent application number | Description | Published |
20110138122 | GATHER AND SCATTER OPERATIONS IN MULTI-LEVEL MEMORY HIERARCHY - Methods and apparatus relating to gather or scatter operations in a multi-level cache are described. In some embodiments, a logic may determine whether to perform gather or scatter operations at a first memory or a second memory, based in part on a relative performance of performing the gather or scatter operations at the first memory and the second memory. Other embodiments are also described and claimed. | 06-09-2011 |
20110238680 | Time and space efficient sharing of data structures across different phases of a virtual world application - A method of decreasing a total computation time for a visual simulation loop includes sharing a common data structure across each phase of the visual simulation loop by adapting the common data structure to a requirement for each particular phase prior to performing a computation for that particular phase. | 09-29-2011 |
20120137074 | METHOD AND APPARATUS FOR STREAM BUFFER MANAGEMENT INSTRUCTIONS - A method and system to perform stream buffer management instructions in a processor. The stream buffer management instructions facilitate the creation and usage of a dedicated memory space or stream buffer of the processor in one embodiment of the invention. The dedicated memory space is a contiguous memory space and has a sequential or linear addressing scheme in one embodiment of the invention. The processor has logic to execute a stream buffer management instruction to copy data from a source memory address to a destination memory address that is specified with a desired level of memory hierarchy. | 05-31-2012 |
20120290799 | GATHER AND SCATTER OPERATIONS IN MULTI-LEVEL MEMORY HIERARCHY - Methods and apparatus relating to gather or scatter operations in a multi-level cache are described. In some embodiments, a logic may determine whether to perform gather or scatter operations at a first memory or a second memory, based in part on a relative performance of performing the gather or scatter operations at the first memory and the second memory. Other embodiments are also described and claimed. | 11-15-2012 |
20130086354 | CACHE AND/OR SOCKET SENSITIVE MULTI-PROCESSOR CORES BREADTH-FIRST TRAVERSAL - Methods, apparatuses and storage device associated with cache and/or socket sensitive breadth-first iterative traversal of a graph by parallel threads, are disclosed. In embodiments, a vertices visited array (VIS) may be employed to track graph vertices visited. VIS may be partitioned into VIS sub-arrays, taking into consideration cache sizes of LLC, to reduce likelihood of evictions. In embodiments, potential boundary vertices arrays (PBV) may be employed to store potential boundary vertices for a next iteration, for vertices being visited in a current iteration. The number of PBV generated for each thread may take into consideration a number of sockets, over which the processor cores employed are distributed. In various embodiments, the threads may be load balanced; further data locality awareness to reduce inter-socket communication may be considered, and/or lock-and-atomic free update operations may be employed. Other embodiments may be disclosed or claimed. | 04-04-2013 |
20130297878 | GATHER AND SCATTER OPERATIONS IN MULTI-LEVEL MEMORY HIERARCHY - Methods and apparatus relating to gather or scatter operations in a multi-level cache are described. In some embodiments, a logic may determine whether to perform gather or scatter operations at a first memory or a second memory, based in part on a relative performance of performing the gather or scatter operations at the first memory and the second memory. Other embodiments are also described and claimed. | 11-07-2013 |
20130339395 | PARALLEL OPERATION ON B+ TREES - Embodiments of techniques and systems for parallel processing of B+ trees are described. A parallel B+ tree processing module with partitioning and redistribution may include a set of threads executing a batch of B+ tree operations on a B+ tree in parallel. The batch of operations may be partitioned amongst the threads. Next, a search may be performed to determine which leaf nodes in the B+ tree are to be affected by which operations. Then, the threads may redistribute operations between each other such that multiple threads will not operate on the same leaf node. The threads may then perform B+ tree operations on the leaf nodes of the B+ tree in parallel. Subsequent modifications to nodes in the B+ may similarly be redistributed and performed in parallel as the threads work up the tree. | 12-19-2013 |
20140089276 | SEARCH UNIT TO ACCELERATE VARIABLE LENGTH COMPRESSION/DECOMPRESSION - Systems and methods to accelerate compression and decompression with a search unit implemented in the processor core. According to an embodiment, a search unit may be implemented to perform compression or decompression on an input stream of data. The search unit may use a look-up table to identify appropriate compression or decompression symbols. The look-up table may be populated with a table derived using the variable length coding symbols of a sequence of vertices to be compressed or extracted from a received data stream to be decompressed. A comparator and a finite state machine may be implemented in the search unit to facilitate traversal of the look-up table. | 03-27-2014 |
20140337580 | GATHER AND SCATTER OPERATIONS IN MULTI-LEVEL MEMORY HIERARCHY - Methods and apparatus relating to gather or scatter operations in a multi-level cache are described. In some embodiments, a logic may determine whether to perform gather or scatter operations at a first memory or a second memory, based in part on a relative performance of performing the gather or scatter operations at the first memory and the second memory. Other embodiments are also described and claimed. | 11-13-2014 |
Patent application number | Description | Published |
20150221088 | METHOD FOR ESTIMATING A QUANTITY OF A BLOOD COMPONENT IN A FLUID RECEIVER AND CORRESPONDING ERROR - A method and system for communicating estimated blood loss parameters of a patient to a user, the method comprising: receiving data representative of an image, of a fluid receiver; automatically detecting a region within the image associated with a volume of fluid received at the fluid receiver, the volume of fluid including a blood component; calculating an estimated amount of the blood component present in the volume of fluid based upon a color parameter represented in the region, and determining a bias error associated with the estimated amount of the blood component; updating an analysis of an aggregate amount of the blood component and an aggregate bias error associated with blood loss of the patient, based upon the estimated amount of the blood component and the bias error; and providing information from the analysis of the aggregate amount of the blood component and the aggregate bias error, to the user. | 08-06-2015 |
20150294460 | METHOD FOR ESTIMATING A QUANTITY OF A BLOOD COMPONENT IN A FLUID CANISTER - A system and method for assessing the concentration of a fluid component within a container, the method comprising: receiving data associated with an image of the canister; from the image, detecting a color grid comprising color elements coupled to the canister,; selecting a region of the image corresponding to a portion of the canister; determining a match between a detected color of the region and a shade in the set of colors associated with the color grid captured in the image; based upon a position of a color element corresponding to the shade in the color grid, retrieving a concentration of the blood component associated with the shade of color. | 10-15-2015 |
20150294461 | METHOD FOR ESTIMATING A QUANTITY OF A BLOOD COMPONENT IN A FLUID CANISTER - A method and system for assessing an amount of a blood component of a volume of fluid within a canister, the method comprising: receiving an image of the canister generated by the image acquisition device; selecting a first region of the image exhibiting substantially uniform color, wherein the first region of the image corresponds to a layer of fluid situated between a wall of the canister and a first feature of an insert retained in position within the canister; determining a color parameter representative of the first region; determining a concentration of a blood component within the canister, based upon the color parameter; upon determining the volume of fluid of fluid within the canister, generating an analysis informative of an amount of the blood component within the canister; and providing information derived from the analysis to an entity associated with an individual from whom the volume of fluid originated. | 10-15-2015 |
Patent application number | Description | Published |
20120123515 | SYSTEM AND METHOD FOR REMOVING AN IMPLANTED OBJECT IN A PASSAGEWAY IN A PATIENT - A system for removing an implanted stent or other object from a passageway in a patient includes a housing, an expansion element that operates between an enlarged mode in which the expansion element may radially expand to a diameter larger than the object diameter and a collapsed mode in which the expansion element radially contracts, and a plurality of radially contractible members configured to circumferentially engage the implanted object. A method for moving an implanted stent or other object from an initial location in a passageway includes positioning an expansion element proximate to the stent, expanding the expansion element thereby creating a tapered annular space between the stent and the passageway, advancing a plurality of members towards the tapered annular space, engaging the stent with the members, radially contracting the members to radially compress the stent, and moving the compressed stent from the initial location. | 05-17-2012 |
20130010094 | SYSTEM AND METHOD FOR ESTIMATING EXTRACORPOREAL BLOOD VOLUME IN A PHYSICAL SAMPLE - One method for estimating the extracorporeal blood volume in a portion of a physical sample includes: extracting a feature from a portion of an image of the sample; tagging the portion of the image of the sample with a blood volume indicator according to the extracted feature; and estimating the extracorporeal blood volume in at least the portion of the physical sample, associated with the portion of the image of the sample, according to the blood volume indicator. | 01-10-2013 |
20130011031 | SYSTEM AND METHOD FOR COUNTING SURGICAL SAMPLES - One method for counting surgical samples comprises: identifying a physical sample in a field of view of an optical sensor; indexing a sample counter for the identified physical sample; extracting a feature from a portion of the field of the view of the optical sensor; and estimating the extracorporeal blood volume in a portion of the physical sample based upon the extracted feature. | 01-10-2013 |
20130011042 | SYSTEM AND METHOD FOR ESTIMATING EXTRACORPOREAL BLOOD VOLUME IN A PHYSICAL SAMPLE - One method for estimating the extracorporeal blood volume in a portion of a physical sample includes: comparing a portion of an image of the sample with a template image of known extracorporeal blood volume indicator; tagging the portion of the image of the sample with a blood volume indicator according to the template image that is matched to the portion of the image of the sample; and estimating the extracorporeal blood volume in at least a portion of the physical sample, associated with the portion of the image of the sample, according to the blood volume indicator. | 01-10-2013 |
20130301901 | SYSTEM AND METHOD FOR ESTIMATING A QUANTITY OF A BLOOD COMPONENT IN A FLUID CANISTER - A variation of a method for estimating a quantity of a blood component in a fluid canister includes: within an image of a canister, identifying a reference marker on the canister; selecting an area of the image based on the reference marker; correlating a portion of the selected area with a fluid level within the canister; estimating a volume of fluid within the canister based on the fluid level; extracting a feature from the selected area; correlating the extracted featured with a concentration of a blood component within the canister; and estimating a quantity of the blood component within the canister based on the estimated volume and the concentration of the blood component within the canister. | 11-14-2013 |
20130303870 | SYSTEM AND METHODS FOR MANAGING BLOOD LOSS OF A PATIENT - One variation of the method for managing blood loss of a patient includes: receiving an image of a physical sample; extracting a feature from an area of the image corresponding to the physical sample; estimating a blood volume indicator of the physical sample according to the extracted feature; estimating a patient blood loss based on the blood volume indicator; estimating a euvolemic patient hematocrit based on an estimated patient blood volume and the estimated patient blood loss; receiving a measured patient hematocrit; and generating a volemic status indicator based on a comparison between the measured patient hematocrit and the estimated euvolemic patient hematocrit. | 11-14-2013 |
20140126788 | METHOD FOR TRIGGERING BLOOD SALVAGE - One variation of a method for triggering blood cell salvage for a patient includes: processing a first photographic image of a canister to estimate a content of a blood component within the canister; processing a second photographic image of a gauze sponge to estimate a content of the blood component in the gauze sponge; estimating an aggregate salvageable blood component content for the patient based on the estimated content of the blood component within the canister and the estimated content of the blood component in the gauze sponge; and in response to the estimated aggregate salvageable blood component content exceeding a threshold salvageable blood component content, generating a prompt to salvage the blood component from fluid within the canister and from the gauze sponge. | 05-08-2014 |
20140128838 | METHOD FOR SETTING A BLOOD TRANSFUSION PARAMETER - One variation of a method for setting a blood transfusion parameter for a patient includes identifying a blood transfusion bag in a photographic image; extracting a color feature from a region of the photographic image corresponding to the blood transfusion bag; estimating a blood component content within the blood transfusion bag based on the color feature; and triggering transfusion from the blood transfusion bag based on the blood component content within the blood transfusion bag and an estimated volemic status of the patient. | 05-08-2014 |
20150154751 | SYSTEM AND METHOD FOR ESTIMATING A QUANTITY OF A BLOOD COMPONENT IN A FLUID CANISTER - A variation of a method for estimating a quantity of a blood component in a fluid canister includes: within an image of a canister, identifying a reference marker on the canister; selecting an area of the image based on the reference marker; correlating a portion of the selected area with a fluid level within the canister; estimating a volume of fluid within the canister based on the fluid level; extracting a feature from the selected area; correlating the extracted featured with a concentration of a blood component within the canister; and estimating a quantity of the blood component within the canister based on the estimated volume and the concentration of the blood component within the canister. | 06-04-2015 |
Patent application number | Description | Published |
20080244722 | Method and apparatus for accepting a digital identity of a user based on transitive trust among parties - Method and apparatus for accepting a digital identity of a user based on transitive trust among parties are described. One aspect of the invention relates to managing a digital identity of a user. The digital identity is provided to a first party, where the digital identity includes a self-asserted claim. An acceptance token is obtained from the first party. The acceptance token purports authenticity of the self-asserted claim according to the first party. The digital identity and the acceptance token are provided to a second party to request validation of the self-asserted claim by the second party based on the acceptance token. | 10-02-2008 |
20080256594 | Method and apparatus for managing digital identities through a single interface - Method and apparatus for managing digital identities through a single interface is described. One aspect of the invention relates to managing digital identities related to a user. An identity policy of an entity is obtained. At least one relevant digital identity is selected from the digital identities. Each relevant digital identity includes information required by the identity policy. A selected digital identity is obtained from the relevant digital identity or identities. A representation of the selected digital identity is provided to the entity that complies with the identity policy. | 10-16-2008 |
20090089290 | METHODS AND SYSTEMS FOR CREATING AND UPDATING APPROVED-FILE AND TRUSTED-DOMAIN DATABASES - Computer-implemented methods and systems for creating or updating approved-file and trusted-domain databases and verifying the legitimacy of files are disclosed. A method for creating or updating an approved-file database may comprise intercepting a first file, identifying a source domain associated with the first file, identifying a trusted-domain database, determining whether a database record for the source domain associated with the first file exists within the trusted-domain database, creating a hash value for the first file if a database record for the source domain associated with the first file exists within the trusted-domain database, and storing the hash value for the first file in an approved-file database. Methods and systems for verifying the legitimacy of a file and for creating or updating a trusted-domain database are also disclosed. | 04-02-2009 |
20090164899 | Providing Image-Based Guidance for Remote Assistance - Visual images of computer components are provided to remotely guide users through the process of setting up physical connections. Component identifying information is automatically gleaned and provided from a user's computer to a remote administrator. The administrator provides visual images of the components to the user, and remotely annotates them to guide the user through the configuration process. Image annotation can include pointing to a specific section of the image (e.g., the plug into which a cable is to be inserted) and/or drawing or writing on or otherwise marking-up the image to direct the user's attention. The visual image-based guidance can be supplemented by voice communication with the user. | 06-25-2009 |
20090249313 | System and Method for Prioritizing the Compilation of Bytecode Modules During Installation of a Software Application - A system and method for compiling part of the bytecode for a software application into native code at install time when the software application is installed on a particular computer are described. According to one embodiment of the method, usage information for the software application may be received. The usage information may indicate how frequently or commonly each of a plurality of features of the software application is used. The usage information may be analyzed to determine a rank ordering of the features. The method may further comprise installing the software application on the particular computer. Installing the software application may comprise compiling one or more bytecode modules of the software application into native code, where the one or more bytecode modules are selected from a plurality of bytecode modules depending upon the rank ordering of the features. | 10-01-2009 |
20090328224 | Calculating Domain Registrar Reputation by Analysis of Hosted Domains - Reputations of domain registrars are calculated based on the hosting of risky domains. The more undesirable domains a registrar hosts, the lower is its reputation. The risk level of the hosted domains is also a factor in determining the reputation. When a user attempts to access a hosted domain, the calculated reputation of the hosting domain registrar is used in determining what security steps to apply to the access attempt. The worse the reputation of the hosting registrar, the more security is applied, all else being equal. | 12-31-2009 |
20100154027 | Methods and Systems for Enabling Community-Tested Security Features for Legacy Applications - A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems, 2) identifying a legacy application on a client system within the plurality of client systems, 3) identifying a security-feature-enablement rule for the legacy application, 4) enabling at least one security feature for the legacy application by executing the security-feature-enablement rule, 5) determining the impact of the security-feature-enablement rule on the health of the legacy application, and then 6) relaying the impact of the security-feature-enablement rule on the health of the legacy application to a server. Various other methods, systems, and computer-readable media are also disclosed. | 06-17-2010 |
20100162393 | Methods and Systems for Detecting Man-in-the-Browser Attacks - A computer-implemented method for detecting man-in-the-browser attacks may include identifying a transaction fingerprint associated with a web site. The method may also include tracking a user's input to the web site. The user's input may be received through a web browser. The method may further include intercepting an outgoing submission to the web site. The method may additionally include determining whether, in light of the transaction fingerprint, the user's input generated the outgoing submission. Various other methods, systems, and computer-readable media are also disclosed. | 06-24-2010 |
20110271341 | BEHAVIORAL SIGNATURE GENERATION USING CLUSTERING - A behavioral signature for detecting malware is generated. A computer is used to collect behavior traces of malware in a malware dataset. The behavior traces describe sequential behaviors performed by the malware. The behavior traces are normalized to produce malware behavior sequences. Similar malware behavior sequences are clustered together. The malware behavior sequences in a cluster describe behaviors of a malware family. The cluster is analyzed to identify a behavior subsequence common to the cluster's malware family. A behavior signature for the malware family is generated using the behavior subsequence. A trace of new malware is normalized and aligned with an existing cluster, if possible. The behavioral signature for that cluster is generated based on the behavior sequence of the new malware and the other sequences in the cluster. | 11-03-2011 |
20120005750 | Systems and Methods for Alternating Malware Classifiers in an Attempt to Frustrate Brute-Force Malware Testing - A computer-implemented method for alternating malware classifiers in an attempt to frustrate brute-force malware testing may include (1) providing a group of heuristic-based classifiers for detecting malware, wherein each classifier within the group differs from all other classifiers within the group but has an accuracy rate that is substantially similar to all other classifiers within the group, (2) including the group of classifiers within a security-software product, and (3) alternating the security-software product's use of the classifiers within the group in an attempt to frustrate brute-force malware testing by (a) randomly selecting and activating an initial classifier from within the group and then, upon completion of a select interval, (b) replacing the initial classifier with an additional classifier randomly selected from within the group. Various other methods, systems, and computer-readable media are also disclosed. | 01-05-2012 |
20120240229 | SYSTEMS AND METHODS FOR LOOKING UP ANTI-MALWARE METADATA - A computer-implemented method for looking up anti-malware metadata may include identifying a plurality of executable objects to be scanned for malware before execution. The computer-implemented method may also include, for each executable object within the plurality of executable objects, assessing an imminence of execution of the executable object. The computer-implemented method may further include prioritizing, based on the assessments, a retrieval order for anti-malware metadata corresponding to the plurality of executable objects. The computer-implemented method may additionally include retrieving anti-malware metadata corresponding to an executable object within the plurality of executable objects based on the retrieval order. Various other methods, systems, and computer-readable media are also disclosed. | 09-20-2012 |
20130085886 | METHOD AND SYSTEM FOR AUTOMATIC APPLICATION RECOMMENDATION - A system and method of automatic suggested application identification includes accessing a profile of a device, wherein the profile represents information specific to the device. From said profile, a determined pattern of use determined by the device is accessed, wherein the determined pattern is unique to the device. The profile including the determined pattern and a geo-specific data of the device and configuration information of the device and applications resident on the device is compared to similar profiles and similar determined patterns of other devices. A suggested application is identified based on said comparing. | 04-04-2013 |
20140143828 | METHODS AND SYSTEMS FOR ENABLING COMMUNITY-TESTED SECURITY FEATURES FOR LEGACY APPLICATIONS - A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems, 2) identifying a legacy application on a client system within the plurality of client systems, 3) identifying a security-feature-enablement rule for the legacy application, 4) enabling at least one security feature for the legacy application by executing the security-feature-enablement rule, 5) determining the impact of the security-feature-enablement rule on the health of the legacy application, and then 6) relaying the impact of the security-feature-enablement rule on the health of the legacy application to a server. Various other methods, systems, and computer-readable media are also disclosed. | 05-22-2014 |
20140201208 | Classifying Samples Using Clustering - An unlabeled sample is classified using clustering. A set of samples containing labeled and unlabeled samples is established. Values of features are gathered from the samples contained in the datasets and a subset of features are selected. The labeled and unlabeled samples are clustered together based on similarity of the gathered values for the selected subset of features to produce a set of clusters, each cluster having a subset of samples from the set of samples. The selecting and clustering steps are recursively iterated on the subset of samples in each cluster in the set of clusters until at least one stopping condition is reached. The iterations produce a cluster having a labeled sample and an unlabeled sample. A label is propagated from the labeled sample in the cluster to the unlabeled sample in the cluster to classify the unlabeled sample. | 07-17-2014 |
20140331320 | TECHNIQUES FOR DETECTING MALICIOUS ACTIVITY - Techniques for detecting malicious activity are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting malicious activity including receiving information indicating a first process being executed, the first process including a plurality of first process components, receiving information specific to at least one of the plurality of first process components, determining whether the first process exhibits malicious behavior; and identifying which of the plurality of first process components is responsible for the malicious behavior based on the received information. | 11-06-2014 |
20150020197 | IDENTIFYING MISUSE OF LEGITIMATE OBJECTS - A query is received from a client device regarding an object. The query includes an identifier of the object and a set of associated usage attributes describing a usage of the object on the client device. A set of usage facts associated with the identified object is identified. The set of usage facts describe typical usages of the object on a plurality of client devices. A determination is made whether the usage of the object on the client device is suspicious based on the set of usage facts associated with the object and the set of usage attributes included in the query. A report is provided to the client device based on the determination. | 01-15-2015 |
20150281268 | IDENTIFYING MISUSE OF LEGITIMATE OBJECTS - A query is received from a client device regarding an object. The query includes an identifier of the object and a set of associated usage attributes describing a usage of the object on the client device. A set of usage facts associated with the identified object is identified. The set of usage facts describe typical usages of the object on a plurality of client devices. A determination is made whether the usage of the object on the client device is suspicious based on the set of usage facts associated with the object and the set of usage attributes included in the query. A report is provided to the client device based on the determination. | 10-01-2015 |