Patent application number | Description | Published |
20080255785 | Length-of-the-curve stress metric for improved characterization of computer system reliability - Embodiments of the present invention provide a system that characterizes the reliability of a computer system. The system first collects samples of a performance parameter from the computer system. Next, the system computes the length of a line between the samples, wherein the line includes a component which is proportionate to a difference between values of the samples and a component which is proportionate to a time interval between the samples. The system then adds the computed length to a cumulative length variable which can be used to characterize the reliability of the computer system. | 10-16-2008 |
20090100437 | TEMPERATURE-AWARE AND ENERGY-AWARE SCHEDULING IN A COMPUTER SYSTEM - A computer system to schedule loads across a set of processor cores is described. During operation, the computer system receives a process to be executed. Next, the computer system obtains one or more thermodynamic process characteristics associated with the process and one or more thermodynamic processor-core characteristics associated with operation of the set of processor cores. Then, the computer system schedules the process to be executed by at least one of the processor cores based on the one or more thermodynamic process characteristics and the one or more thermodynamic processor-core characteristics. | 04-16-2009 |
20090259347 | METHOD AND APPARATUS FOR CONTROLLING TEMPERATURE VARIATIONS IN A COMPUTER SYSTEM - Some embodiments of the present invention provide a system that controls temperature variations in a computer system. During operation, a telemetry variable of the computer system is monitored. Next, a future temperature of the computer system is predicted based on the telemetry variable. A signal is then generated in response to the future temperature. Then, the signal is sent to a cooling device in the computer system to control temperature variations of the computer system. | 10-15-2009 |
20090271141 | WORKLOAD SCHEDULING IN MULTI-CORE PROCESSORS - A computer system that schedules loads across a set of processor cores is described. During operation, the computer system receives thermal measurements from sensors associated with the set of processor cores, and removes noise from the thermal measurements. Then, the computer system analyzes thermal properties of the set of processor cores based on the thermal measurements. Next, the computer system receives a process to be executed, and schedules the process to be executed by at least one of the processor cores based on the analysis. This scheduling is performed in a manner that reduces spatial and temporal thermal variations in the integrated circuit. | 10-29-2009 |
20090313623 | MANAGING THE PERFORMANCE OF A COMPUTER SYSTEM - Some embodiments of the present invention provide a system that manages a performance of a computer system. During operation, a current expert policy in a set of expert policies is executed, wherein the expert policy manages one or more aspects of the performance of the computer system. Next, a set of performance parameters of the computer system is monitored during execution of the current expert policy. Then, a next expert policy in the set of expert policies is dynamically selected to manage the performance of the computer system, wherein the next expert policy is selected based on the monitored set of performance parameters to improve an operational metric of the computer system. | 12-17-2009 |
Patent application number | Description | Published |
20090154375 | EFFICIENT DETECTION OF RELAY NODE - Whether or not a node is a relay node may be determined by, for each of a plurality of active flows, assigning a random number to the flow, wherein each of the random numbers is drawn from a distribution. Then, for each of a plurality of time slots, any incoming flows to the node and any outgoing flows from the node may be determined, random numbers assigned to any active flow of the incoming flows may be summed to generate a first sum, random numbers assigned to any active outgoing flows may be summed to generating a second sum, and the first sum may be multiplied with the second sum to generate a product associated with the time slot. The products over the plurality of time slots may then be summed to obtain a summed product. This may be repeated, reassigning random values to each of the plurality of flows, thereby obtaining a plurality of summed products. A variance of the plurality of summed products may be determined and compared with a threshold to obtain a comparison result. Whether or not the node is a relay node may then be determined using the comparison result. Execution of a relay node protection policy may be controlled using the determination of whether or not the node is a relay node. | 06-18-2009 |
20120151033 | MOBILE BOTNET MITIGATION - Mitigation of bot networks in wireless networks and/or on mobile devices is provided. A botnet detection component is provided that inspects data traffic and data flows on the wireless network to identify mobile devices that are suspected of behaving as bots. A traffic profile of the suspected bot behavior can be generated and forwarded to the mobile devices that are suspected of behaving as bots. The mobile device can correlate data traffic on the device to the traffic profile in order to identify applications responsible for the suspected bot behavior, and remove the identified applications. | 06-14-2012 |
20120311107 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS TO REDUCE LATENCY - Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application. | 12-06-2012 |
20130054763 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS WITH VIRTUAL PRIVATE NETWORKS - Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically provisioning, for a client, the virtual private mobile network to process wireless network communications associated with the client that correspond to a specified address space of the client, provisioning at least a portion of a server within a cloud computing data center to host resources for the client, and configuring at least a portion of an edge router of the cloud computing data center to transmit the wireless network communications between the portion of the server and the virtual private mobile network. | 02-28-2013 |
Patent application number | Description | Published |
20110179164 | METHOD AND APPARATUS FOR IDENTIFYING MEMBERS OF A PEER-TO-PEER BOTNET - A peer-to-peer (P2P) bot(s) in a network is identified using an already identified P2P bot. More specifically, such embodiments may facilitate determining a candidate set of computers, which may be potential P2P bots, by identifying computers in a network that have a private mutual contact with a seed bot, which is a computer identified as a P2P bot, and identifying additional computers that have private mutual contacts with the identified computers. Further, a confidence level indicative of a certainty of a membership of each of the candidate computers in the P2P botnet is determined and responsive to a determination that the confidence level of the candidate computer exceeds a determined threshold confidence level, the candidate computer is identified as a P2P bot. | 07-21-2011 |
20120233694 | MOBILE MALICIOUS SOFTWARE MITIGATION - Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification. | 09-13-2012 |
20120317641 | PEER-TO-PEER (P2P) BOTNET TRACKING AT BACKBONE LEVEL - A method, computer-readable medium, and system for analyzing backbone traffic to determine compromised hosts from among hosts on a network are provided. The backbone traffic includes data flows. Each of the data flows is analyzed to determine peer-to-peer data flows from among the data flows. Each of the peer-to-peer data flows is one of the data flows having a source address and a destination address that are each unassociated with a domain name. The peer-to-peer data flows are analyzed to determine the compromised hosts from among the hosts. Each of the compromised hosts is interconnected with another of the compromised hosts via at least one of the peer-to-peer data flows. | 12-13-2012 |
20120331545 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY - Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. | 12-27-2012 |
20140006374 | METHOD AND APPARATUS FOR DERIVING AND USING TRUSTFUL APPLICATION METADATA | 01-02-2014 |
20140006375 | METHOD AND APPARATUS FOR ROBUST MOBILE APPLICATION FINGERPRINTING | 01-02-2014 |
20140006418 | METHOD AND APPARATUS FOR RANKING APPS IN THE WIDE-OPEN INTERNET | 01-02-2014 |
20140006440 | METHOD AND APPARATUS FOR SEARCHING FOR SOFTWARE APPLICATIONS | 01-02-2014 |
20140250221 | Methods, Systems, and Computer Program Products for Detecting Communication Anomalies in a Network Based on Overlap Between Sets of Users Communicating with Entities in the Network - Anomalies are detected in a network by detecting communication between a plurality of entities and a set of users in the network, determining an overlap between subsets of the set of users that the entities comprising the plurality of entities communicated with, respectively, and determining whether the communication between the plurality of entities and the set of users is anomalous based on the overlap. | 09-04-2014 |
20150135320 | METHODS AND APPARATUS TO IDENTIFY MALICIOUS ACTIVITY IN A NETWORK - Methods, apparatus, systems and articles of manufacture are disclosed to learn malicious activity. An example method includes assigning weights of a distance function to respective statistical features; iteratively calculating, with a processor, the distance function to adjust the weights (1) to cause a reduction in a first distance calculated according to the distance function for a first pair of entities in a reference group associated with malicious activity and (2) to cause an increase in a second distance calculated according to the distance function for a first one of the entities included in the reference group and a second entity not included in the reference group; and determining whether a first statistical feature is indicative of malicious activity based on a respective adjusted weight of the first statistical feature determined after calculating the distance function for a number of iterations. | 05-14-2015 |
20150163235 | METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY - Methods, apparatus, systems and articles of manufacture are disclosed to identify an Internet protocol address blacklist boundary. An example method includes identifying a netblock associated with a malicious Internet protocol address, the netblock having a lower boundary and an upper boundary, collecting netflow data associated with a plurality of Internet protocol addresses in the netblock, establishing a first window associated with a lower portion of Internet protocol addresses numerically lower than a candidate Internet protocol address, establishing a second window associated with an upper portion of Internet protocol addresses numerically higher than a candidate Internet protocol address, calculating a breakpoint score based on a comparison between a behavioral profile of the first window and a behavioral profile of the second window, and identifying a first sub-netblock when the breakpoint score exceeds a threshold value. | 06-11-2015 |
20150312269 | METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY - Methods, apparatus, systems and articles of manufacture are disclosed to identify candidate boundaries of Internet protocol addresses associated with a malicious Internet protocol address. An example method includes collecting, with a processor, netflow data associated with the Internet protocol addresses within a netblock having a lower boundary Internet protocol address and an upper boundary Internet protocol address, generating, with the processor, a first window of Internet protocol addresses numerically lower than the malicious Internet protocol address, generating, with the processor, a second window of Internet protocol addresses numerically higher than the malicious Internet protocol address, for respective Internet protocol addresses in the first and second windows, calculating, with the processor, occurrence counts associated with behavior features, and identifying candidate boundaries within the netblock based on divergence values caused by the behavior features. | 10-29-2015 |
Patent application number | Description | Published |
20140220786 | METHODS FOR OPTICAL PROXIMITY CORRECTION IN THE DESIGN AND FABRICATION OF INTEGRATED CIRCUITS - A method of manufacturing an optical lithography mask includes providing a patterned layout design comprising a plurality of polygons, correcting the patterned layout design using optical proximity correction (OPC) by adjusting widths and lengths of one or more of the plurality of polygons, to generate a corrected patterned layout design, converting the corrected patterned layout design into a mask writer-compatible format, to generate a mask writer-compatible layout design comprising the plurality of polygons, and biasing each polygon in the plurality of polygons with a bias that accounts for large-scale density values of the patterned layout design, to generate a biased, mask writer-compatible layout design. | 08-07-2014 |
20150235839 | METHODS FOR FABRICATING INTEGRATED CIRCUITS USING DIRECTED SELF-ASSEMBLY INCLUDING LITHOGRAPHICALLY-PRINTABLE ASSIST FEATURES - Methods for fabricating integrated circuits are provided. In one example, a method for fabricating an integrated circuit includes forming assisting etch resistant fill topographical features that overlie a semiconductor substrate and that define an assisting etch resistant fill confinement well using a photomask. The photomask defines an assisting lithographically-printable mask feature. A block copolymer is deposited into the assisting etch resistant fill confinement well. The block copolymer is phase separated into an etchable phase and an etch resistant phase. The assisting etch resistant fill topographical features direct the etch resistant phase to form an etch resistant plug in the assisting etch resistant fill confinement well. | 08-20-2015 |
20150242555 | METHODS FOR FABRICATING INTEGRATED CIRCUITS INCLUDING GENERATING PHOTOMASKS FOR DIRECTED SELF-ASSEMBLY - Methods for fabricating integrated circuits are provided. In one example, a method for fabricating an integrated circuit includes generating a photomask for forming a DSA directing pattern overlying a semiconductor substrate. The DSA directing pattern is configured to guide a self-assembly material deposited thereon that undergoes directed self-assembly (DSA) to form a DSA pattern. Generating the photomask includes inputting DSA target patterns. The DSA target patterns are grouped into groups including a first group and a group boundary is defined around the first group as an initial OPC mask pattern. A circle target is generated around each of the DSA target patterns in the first group to define a merged circle target boundary. The initial OPC mask pattern is adjusted and/or iteratively updated using the merged circle target boundary to generate an output final OPC mask pattern. | 08-27-2015 |
20150287176 | METHOD AND APPRATUS FOR HYBRID TEST PATTERN GENERATION FOR OPC MODEL CALIBRATION - A method and apparatus for hybrid test pattern generation for optical proximity correction (OPC) model calibration is disclosed. Embodiments may include receiving a mask pattern of a chip layout, extracting one or more patterns from the mask pattern, determining one or more parametric data sets for the one or more patterns, retrieving one or more calibration parametric data sets based on one or more other mask patterns, determining a difference between the one or more parametric data sets and the one or more calibration parametric data sets, and adding the one or more parametric data sets to the one or more calibration parametric data sets if the difference satisfies a threshold value. | 10-08-2015 |
Patent application number | Description | Published |
20110034373 | USE OF AN FGF-21 COMPOUND AND A GLP-1 COMPOUND FOR THE TREATMENT OF OBESITY - The present invention provides methods of lowering body weight by administering an FGF-21 compound in combination with a GLP-1 compound. In addition, the present invention also provides methods to treat obesity by administering an FGF-21 compound in combination with a GLP-1 compound. The present invention also discloses combinations useful in the methods of the present invention. | 02-10-2011 |
20120264683 | USE OF AN FGF-21 COMPOUND AND A GLP-1 COMPOUND FOR THE TREATMENT OF OBESITY - The present invention provides methods of lowering body weight by administering an FGF-21 compound in combination with a GLP-1 compound. In addition, the present invention also provides methods to treat obesity by administering an FGF-21 compound in combination with a GLP-1 compound. The present invention also discloses combinations useful in the methods of the present invention. | 10-18-2012 |
20140024586 | USE OF AN FGF-21 COMPOUND AND A GLP-1 COMPOUND FOR THE TREATMENT OF OBESITY - The present invention provides methods of lowering body weight by administering an FGF-21 compound in combination with a GLP- | 01-23-2014 |
20140056893 | Homodimeric Proteins - This present invention relates to a homodimeric protein comprising fibroblast growth factor 21 (FGF21) and glucagon-like peptide (GLP-1), pharmaceutical compositions comprising the homodimeric protein, and methods for treating type 2 diabetes, obesity, dyslipidemia, and/or metabolic syndrome using such homodimeric protein. | 02-27-2014 |