|| List of recent Able-related patents
|System for detecting rogue network protocol service providers|
A method, system, and computer program product embodied in a computer readable storage medium are disclosed for identifying a rogue network protocol service provider. Embodiments include passively monitoring traffic on a target network, and identifying a response to a network protocol request in the traffic on the network.
|Method of initiating randomized communication links among persons belonging to an organization by executing computer-executable instructions stored on a non-transitory computer-readable medium|
A method of initiating randomized communication links among persons belonging to an organization by executing computer-executable instructions stored on a non-transitory computer-readable medium allows members within an organization to submit requests to be engaged with other organization members for various activities such as eating or exercising. Engagement requests specify a time frame and a location to meet with other users.
|Trusted application migration across computer nodes|
An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop).
|Adaptive feedback loop based on a sensor for streaming static and interactive media content to animals|
A system or method for inferring and selective display of visual and sound media content based on a pet(s)'s level of engagement or reactions to content displayed on any number of content display devices including, but not limited to, television screens, computer monitors, tablets, and cell phones and measured by a sensor. A content selection algorithm takes as input the sensor measurements and historical or pre-computed data to infer the pet(s)'s preference for content.
|Data flow graph processing device, data flow graph processing method, and data flow graph processing program|
A data flow graph processing device that transforms a data flow graph including a loop structure into a pipeline operation capable of determining node execution order and judging whether or not executable, comprises: a delay node divider that divides a delay node included in t data flow graph into a value update node and a value output node; a dependency relation adder that adds dependency relations from the start node of the data flow graph to the value output node; and a hidden dependency relation adder that adds hidden dependency relations, indicating previous iteration and current iteration dependencies, from the value update node to the value output node.. .
|Method and system for leveraging performance of resource aggressive applications|
A simultaneous multithreading computing system obtains process information for the simultaneous multithreading computing system. The process information comprises a plurality of processes associated with the simultaneous multithreading computing system.
|Computer product, execution control device, and execution control method|
A computer-readable recording medium stores an execution control program that causes a computer to execute a process that includes receiving an execution request for a given operation for a system; detecting number of operations that are of a type identical to that of the given operation and are under execution by a computing device that is in the system and involved in the execution of the given operation for which the execution request is received; comparing the number of operations detected at the detecting and the number of operations that are of the type and simultaneously executable by the computing device such that the execution of the given operation is completed within a given period by the computing device; and assigning the given operation to the computing device, based on a result of comparison at the comparing.. .
|Management of virtual desktop infrastructure (vdi) sessions using real-time network conditions|
Devices, methods and instructions encoded on computer readable medium are provided herein for management of virtual desktop infrastructure (vdi) sessions in a vdi system based on real-time network conditions. In one example, a request for allocation of bandwidth to a first vdi session configured to operate in parallel with a plurality of other vdi sessions in a network is received at a network device.
|Remote card content management using synchronous server-side scripting|
Remote card content management using synchronous server-side scripting is provided. A system includes a computer processor and a script interpreter executable by the computer processor.
|Registration-based remote debug watch and modify|
A remote debugging technique provides anonymity of program variables and selective debugging capability by providing a registration facility by which program variables are registered locally with a debugging module. An external program then communicates with the debugging modules and observes and/or modifies the program variables by specifying either an index or a variable name.
|Test script generation|
Disclosed herein are techniques for generating an automated testing script. A request for a performance evaluation of a computer program is accessed.
|Method and system for design and modeling of vertical interconnects for 3di applications|
A system and method for design and modeling of vertical interconnects for 3di applications. A design and modeling methodology of vertical interconnects for 3di applications includes models that represent the frequency dependent behavior of vertical interconnects by means of multi-segment rlc scalable filter networks.
|Presentation of image on display screen with combination crop and rotation and with auto-resizing of crop field|
A portable electronic device, computer program product, and method of presenting image information on a display with combined cropping and rotation selection and auto-resizing of cropped portion of the displayed image. A processor accepts a selection of a portion of a displayed image by creating and displaying a selection rectangle frame over the displayed image based on detecting a first user gesture in connection with the displayed image.
|Method for sharing notes of an electronic book and electronic reader thereof, computer readable storage medium|
A method for sharing notes of an electronic book (e-book) is illustrated. The method includes steps of: comparing an identification information of a note file with a book information of the electronic book for determining whether the note file corresponds to the electronic book; receiving and transferring the note file to an electronic reader displaying the electronic book when the note file corresponds to the electronic book; stacking and displaying at least one note layer included in the note file above an electronic page of electronic book displayed on a user interface of the electronic reader, wherein the note layer includes an auxiliary annotation associated with content of the electronic page and the note layer is independent of the electronic page.
|System and method of skinning themes|
A mobile communication device and non-transitory computer readable memory is provided. A processor executes instructions to provide a parser for parsing at least one skinning theme document into a template describing rendering characteristics of a graphical interface, the skinning theme document identifying at least one data element.
|Haptic interface for portable electronic device|
The application includes an apparatus connectable with a portable electronic and/or consumer electronics device that provides haptic information and/or feedback to a user of the portable electronic device. The apparatus may include one or more acousto-haptic transducers that provide at least one of audio and haptic output to a user of the portable electronic device.
|Web management device, web management method, web management program, computer readable recording medium for recording said program, and web system|
A web management device is capable of displaying a web page containing an object in a display area of an input device having the display area and detecting physical contact with the display area. The device includes a generating means for generating the web page with an embedded detectable range for acquiring a position of physical contact with the object displayed in the display area, an acquiring means for acquiring a position of physical contact made within the detectable range of the web page generated and displayed in the display area as a selected position of the object corresponding to the range and acquiring position information indicating the selected position, a storing means for storing the acquired position information, and an adjusting means for compiling the stored position information and adjusting a display target in the display area based on the compiled position information..
|System and method for viewing and marking maps|
The present invention is directed to a method and device for obtaining, viewing and marking maps in real time. Maps are obtained from a list of maps, the maps are then viewed on interactive tabletop displays allowing a user to visualize a mapped location and “markup” points on the map.
|Core circuit test architecture|
A scan test architecture facilitates low power testing of semiconductor circuits by selectively dividing the serial scan paths into shorter sections. Multiplexers between the sections control connecting the sections into longer or shorted paths.
|Validation of a system using a design of experiments processing technique|
A validation system includes a test block that operates to apply a set of inputs to a system under test, such as a test system or an executable test algorithm, and receive from said system under test a first set of outputs produced by operation of the system under test in response to application of the set of inputs. The first set of outputs, as well as a second set of outputs reflecting output produced by operation of a reference system or executable reference algorithm in response to application of the same set of inputs, is processed to make a validation determination.
|Information processing apparatus, method of measuring delay difference, and computer readable recording medium recorded with delay difference measuring program|
Each of the plurality of second processing units includes: a counter that counts a count value in synchronization with such a counter included in each remaining second processing unit; a register that holds the count value of the counter; and a control unit that stores the count value, which is counted by the counter when receiving a measurement instruction from the first processing unit, as a receipt-timing count value into the register and notifies the first processing unit of the held receipt-timing count value, and the first processing unit calculates one or more differences between a plurality of the receipt-timing count values notified from the second processing units as a transmitting delay difference from the first processing unit to each of the plurality of second processing units.. .
|Method for performing power management in an active optical cable (aoc)|
An active optical cable is provided that incorporates a power management solution. The aoc has plugs are configured to mate with respective usb sockets.
|Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium|
A computing apparatus outputs τ1 and τ2 corresponding to a ciphertext x, a capability providing apparatus uses τ1 to correctly compute f(τ1) with a probability greater than a certain probability and sets the result of the computation as z1, uses τ2 to correctly compute f(τ2) with a probability greater than a certain probability and sets the result of the computation as z2, the computing apparatus generates a computation result u=f(x)bx1 from z1, generates a computation result v=f(x)ax2 from z2, and outputs ub′va′ if the computation results u and v satisfy a particular relation, where g and h are groups, f(x) is a function for obtaining an element of the group g for xεh, x1 and x2 are random variables having values in the group g, x1 is a realization of the random variable x1, and x2 is a realization of the random variable x2.. .
|System and method for secure software update|
A secure software update provides an update utility with an update definition, a private encryption key and a public signature key to a target device. A software update package is prepared on portable media that includes an executable update program, a checksum for the program that is encrypted with a symmetrical key, an encrypted symmetrical key that is encrypted with a public encryption key and a digital signature prepared with a private signature key.
|Highly scalable architecture for application network appliances|
A highly scalable application network appliance is described herein. According to one embodiment, a network element includes a switch fabric, a first service module coupled to the switch fabric, and a second service module coupled to the first service module over the switch fabric.
|Scalable cache coherence for a network on a chip|
Maintaining cache coherence in a system-on-a-chip with both multiple cache coherent master ip cores (ccms) and non-cache coherent master ip cores (ncms). A plug-in cache coherence manager (cm), coherence logic in agents, and an interconnect are used for the soc to provide a scalable cache coherence scheme that scales to an amount of ccms in the soc.
|Macroscalar vector prefetch with streaming access detection|
A method and system for implementing vector prefetch with streaming access detection is contemplated in which an execution unit such as a vector execution unit, for example, executes a vector memory access instruction that references an associated vector of effective addresses. The vector of effective addresses includes a number of elements, each of which includes a memory pointer.
|Providing data to a user interface for performance monitoring|
A method, system, and computer readable storage medium for providing data to a user interface for performance monitoring are disclosed, in which an a data definition is acquired, where the data definition is generated in response to a definition of the user interface. Data is acquired from data sources based on the data definition.
|Methods, systems, and computer readable media for generating test packets in a network test device using value list caching|
Methods, systems, and computer readable media for generating test packets in a network device using value lists caching are disclosed. In one method, value lists are stored in dynamic random access memory of a network test device.
|Scalable portable-computer system|
An innovative portable-computer module comprises a top and a bottom interconnection port, preferably oriented in a plane perpendicular to the base surface of the computer. Different embodiments include a laptop computer, an extended laptop computer and a tablet computer.
|Service-aware distributed hash table routing|
In one embodiment, a node in a computer network joins a global ring associated with a distributed hash table (dht), and maintains a dht routing table and dht database for the global ring. In addition, the node may determine a particular service class for which the node is configured, and may join a particular service-based sub-ring according to the particular service class, where all nodes of the particular service-based sub-ring are within the global ring.
|Systems and methods for managing mobile app data|
A mobile device is described. The mobile device has a communication device, a display, an input device, a processor, and a non-transitory computer readable medium.
|Method of enabling digital music content to be downloaded to and used on a portable wireless computing device|
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g.
|System for detecting the presence of rogue domain name service providers through passive monitoring|
A method, system, and computer program product embodied in a computer readable storage medium are disclosed for identifying a rogue domain name service (dns) server. Embodiments include passively monitoring traffic on a target network; and identifying a dns resolution response in the traffic on the network.
|System and method for sharing data across multiple electronic devices|
Methods, computer readable media, and electronic devices are provided that enable data files to be transferred from a source device to one or more destination devices to share the data files. The method includes initiating a transfer of at least one data file to a destination device after detecting initiation of a file sharing session, the at least one data file being associated with the source device; after transferring at least a portion of the at least one data file, sending a first command to the destination device or receiving a second command from the destination device, the first command or the second command indicating an interaction with the at least one data file; and executing the interaction..
|Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device|
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device are disclosed. In one embodiment, a system may comprise a networked device, a relevancy-matching server, and a client device.
|Media processing device and pos system|
A system that controls and operates a plurality of media processing devices can also operate devices having different specifications. A multifunction device has a roll paper print unit; a first interface that receives data from a pos terminal; a conversion unit that converts a command contained in the received data to a first executable command that is executed by the roll paper print unit, or a second executable command that is executed by a printer; a second interface that sends the converted data to the printer; and a control unit that changes between a first operating mode in which the roll paper print unit executes the first executable command, or a second operating mode in which data including the second executable command is sent by the second interface to the printer..
|Fat directory structure for use in transaction safe file system|
Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode.
|Systems, methods, and computer program products for fast and scalable proximal search for search queries|
Embodiments of the invention provide a method and computer program products for information retrieval from multiple documents by proximity searching for search queries. A method includes generating an index for the multiple documents, wherein the index includes words in snippets in the documents.
|Systems, methods and computer program products for fast and scalable proximal search for search queries|
Embodiments of the invention provide a system, method and computer program products for information retrieval from multiple documents by proximity searching for search queries. A method includes generating an index for the multiple documents, wherein the index includes words in snippets in the documents.
|Mapping dataset elements|
Among other things, one aspect includes receiving one or more mapped relationships between a given output and one or more inputs represented by input variables, at least one of the mapped relationships including a transformational expression, the transformational expression defining an output of a mapped relationship based on at least one input variable mapped to an element of an input dataset; receiving identification of elements of an output dataset mapped to outputs of respective mapped relationships; generating output data according to the transformational expression based on input data from the input dataset associated with the element of the input dataset mapped to the input variable; determining validation information in response to the generated output data based on validation criteria defining one or more characteristics of valid values associated with one or more of the identified elements of the output dataset; and presenting visual feedback based on the determined validation information.. .
|Lightweight integrity protection for web storage-driven content caching|
Methods, systems, and computer-readable storage media for providing integrity protection for web storage-driven content caching. Implementations include receiving a web page from a server, the web page being associated with a script library and one or more items that can be stored in web storage of a web browser executed on a client computing device, each of the one or more items being associated with a pre-determined checksum value, and loading the script library, such that a local storage api is overwritten using a wrapper function, the script library being executable to, in response to a request for an item from web storage, perform operations including: determining a generated checksum value based on the item, and verifying an integrity of the item based on the generated checksum value and a pre-determined checksum value associated with the item..
|System and method to enable detection of viral infection by users of electronic communication devices|
A non-transitory computer readable medium that stores instructions for causing a computerized system to perform the following operations: determining, by the computerized system, that a first person is infected by a first infectious disease; wherein the determination is associated with a first person infection probability attribute; detecting, by the computerized system, based upon location information collected during at least a portion of a first infectious disease manifestation period, the location information being indicative of locations of the first person and other persons, a second person that was within an infection distance from the first person and is potentially infected by the first infectious disease; calculating, by the computerized system, a second person infection probability attribute; and updating, by the computerized system, the first person infection probability attribute in response to the second person infection probability attribute.. .
|Apparatus, and associated method, for slicing and using knowledgebase|
An apparatus, and an associated method, slices a knowledgebase into a knowledgebase portion and stores the knowledgebase portion at a device, such as a smart phone or tablet computer. The sliced knowledgebase is accessed to obtain a current mindset of a user of the device..