Latest Innovations |
---|
|
|
|
|
|
|
|
|
|
|
|
|
Power Balanced Pipelines [14]
Power balancing techniques are provided for improving power efficiency of pipelined processors. A design-level implementation can be incorporated during... Read More [14]
Power balancing techniques are provided for improving power efficiency of pipelined processors. A design-level implementation can be incorporated during synthesis of pipeline clocks in which a register transfer level (RTL) code, operating frequency, and available voltage domains are used to perform cycle time stealing with, and optimize for, power efficiency. A test-level implementation can be incorporated during testing of a chip in which delay and power measurements are used to perform calculations based on cycle time stealing and optimization of power efficiency. The calculations are then used to perform voltage scaling and/or adjust tunable delay buffers. Process variations may also be corrected during test time. A run-time approach can be incorporated for dynamic power balancing in which the operating system keeps track of one or more performance indicators such as a count of floating point instructions and uses a look-up table to provide the appropriate delays. |
Tie Strength Prediction and WeMeddle [15]
A computer-implemented method of predicting tie strength between persons within a social media network includes: modeling tie strengths between a user of... Read More [15]
A computer-implemented method of predicting tie strength between persons within a social media network includes: modeling tie strengths between a user of the social media network and connected persons in the network as a combination of: a plurality of predictive variables, interactions between dimensions of the predictive variables, and network structure of the social media network; altering or filtering a stream of social media content from the connected persons using the tie strength as associated with the respective connected persons according to the modeling; and delivering the altered or filtered stream of social media content to a communications device of the user. |
Live Computer Capture and Triage Tool (CCTT) [16]
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable... Read More [16]
A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the computer-readable medium is inserted into the computer, the processor programmed to: receive case information; receive a type of activity being investigated in response to user inputs to select the activity type from a list of possible activity types; guide the user through capturing data related to the selected activity type through steps presented to the user through one or more screens shown in the display, the steps presented such that a non-expert user can follow them; receive user inputs through a screens to obtain information needed to continue capturing the data related to the selected activity; and store the captured data in a removable data storage device or medium for analysis and use in the cyber investigation. |
Method and System for Distributed, Localized Authentiaction in the Framework of 802.11i [17]
A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of... Read More [17]
A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime. |
Method for Exchanging Messages and Verifying the Authenticity of the Messages in an Ad Hoc Network [18]
A method for exchanging messages containing reliable information between nodes in an ad hoc network, such as a vehicle ad hoc network. The method includes... Read More [18]
A method for exchanging messages containing reliable information between nodes in an ad hoc network, such as a vehicle ad hoc network. The method includes the steps of providing a public key for a PKI encrypted certificate authority signature to all nodes known to transmit reliable information. Each node transmits a signal containing node identification information and the PKI encrypted certificate authority signature associated with that node. Each node also receives like signals from other nodes and then decrypts the certificate authority signatures from the received signals by using the certificate authority public key to ascertain the authenticity of the received certificate authority signatures and the reliability of the received message. Thereafter, the nodes receive and accept messages with a TESLA encrypted signature only with nodes identified to have authentic certificate authority signatures until the occurrence of a subsequent predefined event, such as a new node in the network or the elapse of a predetermined time period. |
A Method for Transaction Dependency Graph Construction Using Signal Injection [19]
A method for measuring system response sensitivity, using live traffic and an analysis that converts randomly arriving stimuli and reactions to the stimuli... Read More [19]
A method for measuring system response sensitivity, using live traffic and an analysis that converts randomly arriving stimuli and reactions to the stimuli to mean measures over chosen intervals, thereby creating periodically occurring samples that are processed. The system is perturbed in a chosen location of the system in a manner that is periodic with frequency p, and the system's response to arriving stimuli is measured at frequency p. The perturbation, illustratively, is with a square wave pattern. |
Fast and Accurate Quantum Chemistry Simulations via Multiobjective Genetic Algorithms [20]
Embodiments of the present invention provide, among other things, methods, apparatus, and systems for tuning a semiempirical process for predicting energy... Read More [20]
Embodiments of the present invention provide, among other things, methods, apparatus, and systems for tuning a semiempirical process for predicting energy for different molecular configurations. In an example method, an energy value and an energy gradient are determined for each of a plurality of molecular configurations using an accurate method. A functional form of the semiempirical process is optimized using the determined energy values and energy gradients via multiobjective optimization. The functional form relates one or more parameters to energy values and energy gradients. |
A Technique for Improving Performance by Preexecuting Instructions within a Simple Processor Pipeline [21]
A processor triggers a first advanced execution processing pass to an instruction sequence in response to a first stalled instruction and initiates... Read More [21]
A processor triggers a first advanced execution processing pass to an instruction sequence in response to a first stalled instruction and initiates execution of a further instruction in the instruction sequence that stalls during the performance of the first advanced execution processing pass. A second advanced execution pass is performed through the instruction sequence in which the further instruction is processed again to provide a valid result after stalling. In one form, the first instruction is performed while the processor operates in a normal execution mode and the first and second advanced execution processing passes are performed while the processor operates in an advance execution mode. |
Adaptive Time Continuation in Competent Genetic and Evolutionary Algorithms [22]
Methods and systems for optimizing a solution set. A solution set is generated, and solutions in the solution set are evaluated. Desirable solutions from... Read More [22]
Methods and systems for optimizing a solution set. A solution set is generated, and solutions in the solution set are evaluated. Desirable solutions from the solution set are selected. A structural model is created using the desirable solutions, and a surrogate fitness model is created based on the structural model and the desirable solutions. A new solution set may be generated and/or evaluated, based on analyzing at least one of the structural model and the surrogate fitness model, and determining a method for generating a new solution set and/or evaluating the new solution set based at least in part on the analyzing. |
A Symmetric Digital Chaotic Cryptosystem: The Alpcan Chaotic Cipher (ACC) [23]
A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic... Read More [23]
A symmetric cryptosystem uses cascaded chaotic maps to encrypt plaintext and decrypt ciphertext. Received plaintext is encrypted using the cascaded chaotic maps to generate a ciphertext. The ciphertext can then be decrypted using the same cascaded chaotic maps in order to retrieve the plaintext. |
iWatcher: Simple and General Architectural Support for Software Debugging [24]
Methods and systems for memory monitoring. A triggering access is detected at one or more monitored memory regions. When a triggering access is detected, a... Read More [24]
Methods and systems for memory monitoring. A triggering access is detected at one or more monitored memory regions. When a triggering access is detected, a function is accessed for determining a monitoring function, and a monitoring function associated with a particular triggered memory location address is automatically determined. |
Scalable System Software for a Gigabit Active Router [25]
In the present scalable system routing method, received packets are associating with threads for processing the received packets. While a previously... Read More [25]
In the present scalable system routing method, received packets are associating with threads for processing the received packets. While a previously received packet is being processed, arrival of an interrupt is checked. If there is an interrupt, a thread is created associating the interrupt is created. Then, a determination of whether the thread associated with the interrupt has a priority that is higher than the priority of a thread associated with the previously received packet is made. If the thread associated with the interrupt has a higher priority than the previously received packet, the thread associated with the previously received packet is saved in a Shared Arena storage area. However, if the thread associated with the interrupt does not have a higher priority than the previously received packet, the thread associated with the interrupt is queued. Because threads are attached to the packets, the threads can now be suspended and resumed without having to disable interrupts, which includes periods during a context switch. As a result, a more flexible and efficient scheduling routing method can be implemented. |
Method for Allocating Multiple Authentication Certificates to Vehicles in a Vehicle -to-Vehicle Communication Network [26]
In a vehicle-to-vehicle communication network utilizing PKI security methods to protect communications and in which the PKI encryption utilizes a... Read More [26]
In a vehicle-to-vehicle communication network utilizing PKI security methods to protect communications and in which the PKI encryption utilizes a Certificate Authority having both a private key and a publicly distributed key, a method for allocating multiple certificates for each vehicle which are assigned to each vehicle in the communication network. The method includes the step of assigning a unique secret key k to each vehicle in the communication network. The Certificate Authority then creates a plurality of public key and private key encryption pairs for each vehicle and each encryption pair is associated with an index i. A plurality of certificates are then created with one certificate for each value of the index. A revocation list comprising the secret keys is maintained by the Certificate Authority so that all encryption pairs assigned to a particular vehicle may be revoked by the secret key k corresponding to that vehicle. |
|
Links
[1] https://otm.illinois.edu/technologies/new-easy-use-web-based-software-tools-give-novtf04031
[2] https://otm.illinois.edu/technologies/active-interactive-genetic-algorithms-reducingtf05199
[3] https://otm.illinois.edu/technologies/chemically-patchy-particles-stationary-phastf07006
[4] http://otm.illinois.edu/technologies/method-produce-janus-particles-large-quanttf06170
[5] https://otm.illinois.edu/technologies/self-assessing-mechanochromic-materialstf07125
[6] https://otm.illinois.edu/technologies/visual-indication-mechanical-damage-using-microtf10062
[7] https://otm.illinois.edu/technologies/enhancements-method-system-and-apparatus-ftf04030
[8] https://otm.illinois.edu/technologies/pressure-activated-flexible-orifice-spray-nozzles-tf07007
[9] https://otm.illinois.edu/technologies/role-cochlear-processing-human-speectf08134
[10] https://otm.illinois.edu/technologies/quantum-nanopore-structuretf07067
[11] https://otm.illinois.edu/technologies/atomic-lasers-excimer-exciplex-assisted-abstf07018
[12] https://otm.illinois.edu/technologies/patterning-methods-stretchable-structurestf08061
[13] https://otm.illinois.edu/technologies/visualization-internet-based-information-visit
[14] https://otm.illinois.edu/technologies/power-balanced-pipelines
[15] https://otm.illinois.edu/technologies/tie-strength-prediction-and-wemeddle
[16] https://otm.illinois.edu/technologies/live-computer-capture-and-triage-tool-cctt
[17] https://otm.illinois.edu/technologies/method-and-system-distributed-localized-authentiaction-framework-80211i
[18] https://otm.illinois.edu/technologies/method-exchanging-messages-and-verifying-authenticity-messages-ad-hoc-network
[19] https://otm.illinois.edu/technologies/method-transaction-dependency-graph-construction-using-signal-injection
[20] https://otm.illinois.edu/technologies/fast-and-accurate-quantum-chemistry-simulations-multiobjective-genetic-algorithms
[21] https://otm.illinois.edu/technologies/technique-improving-performance-preexecuting-instructions-within-simple-processor
[22] https://otm.illinois.edu/technologies/adaptive-time-continuation-competent-genetic-and-evolutionary-algorithms
[23] https://otm.illinois.edu/technologies/symmetric-digital-chaotic-cryptosystem-alpcan-chaotic-cipher-acc
[24] https://otm.illinois.edu/technologies/iwatcher-simple-and-general-architectural-support-software-debugging
[25] https://otm.illinois.edu/technologies/scalable-system-software-gigabit-active-router
[26] https://otm.illinois.edu/technologies/method-allocating-multiple-authentication-certificates-vehicles-vehicle-vehicle
[27] https://otm.illinois.edu/technologies/micropatterned-coverslip-fluorescence-microscopy