Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

195results about How to "Less memory" patented technology

Voice over internet protocol data overload detection and mitigation system and method

A system and method is disclosed for detecting and / or mitigating an attempted overload condition targeting a voice over data or Internet protocol system, and the like. A network connection receives a plurality of VOIP or IPTV requests, for example. A processor detects whether two or more of the requests are substantially duplicate. The processor discards further received requests that are determined to be substantially duplicate.
Owner:PROLEXIC TECHNOLOGIES

Determining whether an input string matches at least one regular expression using lookahead finite automata based regular expression detection

Previously configured state machines may accept an input string, and for each of the regular expression(s), check for a match between the input string accepted and the given regular expression using the configured nodes of the state machine corresponding to the given regular expression. Checking for a match between the input string accepted and the given regular expression using configured nodes of a state machine corresponding to the given regular expression by using the configured nodes of the state machine may include (1) checking detection events from a simple string detector, (2) submitting queries to identified modules of a variable string detector, and (3) receiving detection events from the identified modules of the variable string detector.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Debug annotations

An annotation source representation is supported by a compiler and / or linker to annotate program code, so that analysis tools, such as debuggers and profilers, have more information with which to analyze an executable program. The annotation source representation in the source code is compiled into annotation information so that the annotation remains in the executable code, but is not executed. The annotation information in the executable program is associated with the code that the annotation function is associated with. The present invention eliminates the need of parallel / companion input command files, eliminates the need of compiling a special version of the executable program for purposes of analysis, and eliminates the need of implementing debug statements in the source code.
Owner:MICROSOFT TECH LICENSING LLC

Method for controlling user access in sensor networks

A method for implement an energy-efficient user access control to wireless sensor networks is disclosed. A user creates a secret key and sending it to a sensor. The sensor builds a first MAC value by the secret key and sends it to the Key Distribution Center which builds a second MAC value and sending it to the sensor. The sensor decrypts the second MAC value to get a random number, and builds a third MAC value by the random number. The third MAC value is used by the user to authenticate the sensor.
Owner:UNIV IND COOP GRP OF KYUNG HEE UNIV

System and method for efficiently handling multicast packets by ignoring VLAN context

InactiveUS6912589B1Unnecessary replicationPrevents unnecessary replicationSpecial service provision for substationMultiple digital computer combinationsClient-sideMulticast
A method and system for efficiently handling forwarding of multicast packets by ignoring VLAN (virtual local area network) context during lookup. In one embodiment, the present invention receives, at an intermediate device, multicast registration information for a client. The present embodiment then creates a forwarding database of the multicast registration information. In the present embodiment, when handling a multicast packet at an intermediate device, the present invention accesses the multicast registration information stored in the forwarding database. More particularly, in this embodiment, the present invention accesses the multicast registration information stored in the forwarding database without utilizing VLAN context of the client. As a result, the present invention allows the intermediate device to forward a single multicast packet which will later be supplied to registered member ports. The member ports apply the appropriate VLAN context. In so doing, the present invention prevents unnecessary replication of multicast packets and avoids superfluous expensive lookups in multicast registration tables.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products