Engineering
Latest Innovations | ||||||
---|---|---|---|---|---|---|
|
||||||
|
||||||
|
||||||
|
... |
|
Benefits |
|
Power Balanced Pipelines
Power balancing techniques are provided for improving power efficiency of pipelined processors. A design-level implementation can be incorporated during...
Power balancing techniques are provided for improving power efficiency of pipelined processors. A design-level implementation can be incorporated during synthesis of pipeline clocks in which a register transfer level (RTL) code, operating frequency, and available voltage domains are used to perform cycle time stealing with, and optimize for, power efficiency. A test-level implementation can be incorporated during testing of a chip in which delay and power measurements are used to perform calculations based on cycle time stealing and optimization of power efficiency. The calculations are then used to perform voltage scaling and/or adjust tunable delay buffers. Process variations may also be corrected during test time. A run-time approach can be incorporated for dynamic power balancing in which the operating system keeps track of one or more performance indicators such as a count of floating point instructions and uses a look-up table to provide the appropriate delays.
Tie Strength Prediction and WeMeddle
A computer-implemented method of predicting tie strength between persons within a social media network includes: modeling tie strengths between a user of...
A computer-implemented method of predicting tie strength between persons within a social media network includes: modeling tie strengths between a user of the social media network and connected persons in the network as a combination of: a plurality of predictive variables, interactions between dimensions of the predictive variables, and network structure of the social media network; altering or filtering a stream of social media content from the connected persons using the tie strength as associated with the respective connected persons according to the modeling; and delivering the altered or filtered stream of social media content to a communications device of the user.
Live Computer Capture and Triage Tool (CCTT)
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable...
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the computer-readable medium is inserted into the computer, the processor programmed to: receive case information; receive a type of activity being investigated in response to user inputs to select the activity type from a list of possible activity types; guide the user through capturing data related to the selected activity type through steps presented to the user through one or more screens shown in the display, the steps presented such that a non-expert user can follow them; receive user inputs through a screens to obtain information needed to continue capturing the data related to the selected activity; and store the captured data in a removable data storage device or medium for analysis and use in the cyber investigation.
Method and System for Distributed, Localized Authentiaction in the Framework of 802.11i
A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of...
A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime.
Method for Exchanging Messages and Verifying the Authenticity of the Messages in an Ad Hoc Network
A method for exchanging messages containing reliable information between nodes in an ad hoc network, such as a vehicle ad hoc network. The method includes...
A method for exchanging messages containing reliable information between nodes in an ad hoc network, such as a vehicle ad hoc network. The method includes the steps of providing a public key for a PKI encrypted certificate authority signature to all nodes known to transmit reliable information. Each node transmits a signal containing node identification information and the PKI encrypted certificate authority signature associated with that node. Each node also receives like signals from other nodes and then decrypts the certificate authority signatures from the received signals by using the certificate authority public key to ascertain the authenticity of the received certificate authority signatures and the reliability of the received message. Thereafter, the nodes receive and accept messages with a TESLA encrypted signature only with nodes identified to have authentic certificate authority signatures until the occurrence of a subsequent predefined event, such as a new node in the network or the elapse of a predetermined time period.
A Method for Transaction Dependency Graph Construction Using Signal Injection
A method for measuring system response sensitivity, using live traffic and an analysis that converts randomly arriving stimuli and reactions to the stimuli...
A method for measuring system response sensitivity, using live traffic and an analysis that converts randomly arriving stimuli and reactions to the stimuli to mean measures over chosen intervals, thereby creating periodically occurring samples that are processed. The system is perturbed in a chosen location of the system in a manner that is periodic with frequency p, and the system's response to arriving stimuli is measured at frequency p. The perturbation, illustratively, is with a square wave pattern.