Abstract: A system, method and article of manufacture are provided for anisotropic filtering during texture sampling. A description of a region, e.g. pixel footprint in a source image, to be texture sampled is initially received. Thereafter, the region is subdivided based on the description into a plurality of samples with a predetermined shape for mapping textures onto the samples. By subdividing the region in the source image into a plurality of samples having a predetermined shape, the region may be covered by samples that may be configured to be more suitable for an underlying process such as MIP mapping, thus allowing efficient texture sampling while reducing blurring, aliasing and other visual artifacts.
Abstract: A system, method, and computer program product are provided for antialiasing during rendering in a graphics pipeline. Initially, a primitive of vertex data is received in a graphics pipeline. Next, a super-sampling operation is performed on the primitive of vertex data ufilizing the graphics pipeline. Further, a multi-sampling operation is performed on the primitive of vertex data utilizing the graphics pipeline.
Abstract: A system, method and computer program product are provided for analyzing a network utilizing an agent. Initially, a signal is sent from a computer to a host controller utilizing a network. Next, a response to the signal is received from the host controller. Information is then collected relating to network traffic involving the computer based on the response. The information is subsequently sent to the host controller on a periodic basis.
Type:
Grant
Filed:
December 21, 2001
Date of Patent:
March 30, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Herbert V. Joiner, Ravi Verma, Praveen Raghuraman, Ken W. Elwell
Abstract: A method, system and computer program product for analyzing link failure in a network is described, wherein a protocol analyzer captures handshake protocol frames exchanged by two nodes attempting to establish a physical link. The captured handshake protocol frames ordered sets are displayed to the user in a merged, time-ordered list, and the information contained in the frames is decoded and displayed. If an attempt to establish a link fails, the symptoms of the failure and a possible diagnosis are identified and displayed. The user is thereby provided with a complete, understandable picture of the events leading up to the link failure, and with symptoms and possible cause of the link failure.
Abstract: A system and method are provided for improved shadow mapping in a graphics pipeline. Raw depth values are initially collected from two depth layers in a scene to be rendered. Shadow-map depth values are then calculated utilizing the raw depth values. The scene is then shadow mapped utilizing the shadow-map depth values in order to improve the appearance of shadows in a rendered scene. The various steps are carried out by a hardware-implemented graphics pipeline, which may include texturing or shadowing mapping hardware.
Type:
Grant
Filed:
August 31, 2001
Date of Patent:
March 9, 2004
Assignee:
NVIDIA Corporation
Inventors:
Rui M. Bastos, Cass W. Everitt, Mark J. Kilgard
Abstract: A system, method and article of manufacture are provided for converting triangular patches into a form suitable for being rendered using a graphics pipeline adapted to render quadrilateral patches. First, a triangular patch is received. The received triangular patch is then divided into a plurality of quadrilateral patches. Such quadrilateral patches are suitable for being processed by a graphics pipeline specifically equipped to render quadrilateral patches.
Abstract: A system, method, and computer program product for delivery and automatic execution of security, management, or optimization software over an Internet connection to a user computer responsive to a user request entered via a web browser on the user computer. In a preferred embodiment, the user directs the Internet browser to a Internet clinical services provider web site computer and logs in to the site using an identifier and a secure password and optionally makes a selection of the type of servicing desired, wherein an automatically-executing software package encapsulated within a markup language communication unit deliverable across the Internet is delivered, to the user computer, the automatically-executing software package being adapted to perform security, management, or optimization functions on the user computer. User identifiers and passwords enabling the downloads may be provided on a per-download basis or on a subscription basis.
Abstract: A system and method for a remote or network-based application service offering virus scanning, sniffing, or detecting of e-mail viruses prior to the e-mail messages arriving at the destination system or server are disclosed. The method protects a computer system that is configured to receive an e-mail message addressed to a destination e-mail address from viruses in an incoming e-mail message. The method generally includes receiving the incoming e-mail message at a remote e-mail receiving server, scanning the e-mail message for virus, forwarding the e-mail message if it is clean to a remote e-mail sending server, attempting to clean the e-mail message if it is infected to generate a cleaned e-mail message, forwarding the cleaned e-mail message, if any, to the remote e-mail sending server, and forwarding the clean or cleaned e-mail message, if any, to the destination e-mail address from the remote e-mail sending server.
Type:
Grant
Filed:
January 6, 2000
Date of Patent:
March 2, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Do K. Kim, Christopher L. Pearce, Jeffrey J. Constantine
Abstract: In a probe system for monitoring and analyzing data flow and associated activities between devices connected in common to a point in a network, the probe's driver runs in a “Kernel mode” on Windows NT for analyzing packets of data retrieved from the network, whereby programming is provided for operating the Kernel mode driver to monitor the rate of traffic or data packets entering an NIC card buffer, for causing the CPU to respond to an interrupt issued by the NIC everytime a data packet is received at a traffic rate below a predetermined threshold to access data packets entering the NIC card buffer, and to cause the CPU to respond to polling pulses at regular predetermined intervals to access data packets, when the traffic rate exceeds the predetermined threshold, for providing more CPU cycles to analyze the data packets.
Type:
Grant
Filed:
January 28, 2000
Date of Patent:
February 24, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Dominick Anthony Cafarelli, III, Daniel Hansen
Abstract: A wireless analyzer device for an IEEE 802.11 Wireless LAN is programmed to perform both a per packet processing routine to obtain packet statistics, and a one second timer routine, followed by arranging the packet statistics in a logical manner for display on a computer monitor.
Type:
Grant
Filed:
September 17, 2001
Date of Patent:
February 24, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Dominick Anthony Cafarelli, James Peter Anderson
Abstract: One embodiment of the present invention provides a system that detects a macro virus in a computer system by statically analyzing macro operations within a document. The system operates by receiving the document containing the macro operations. The system locates the macro operations within the document, and performs a flow analysis on the macro operations within the document to determine associated values for variables within the macro operations. Next, the system compares the macro operations including the associated values for variables against a profile containing information about suspect macro operations and associated values for variables to determine whether the document contains suspect macro operations. If so, the system informs a user that the document contains suspect macro operations. In one embodiment of the present invention, after informing the user, the system receives instructions from the user specifying an action to take with regards to the document.
Abstract: A method and apparatus provides for wirelessly monitoring data packets or frames transmitted in a wireless LAN, that permits a user to selectively filter out unwanted ones of the data packets or frames with respect to the source and destination hardware addresses, and to the frame type and subtypes.
Type:
Grant
Filed:
June 6, 2001
Date of Patent:
February 17, 2004
Assignee:
Networks Associates Technology, Inc.
Inventors:
Dominick Anthony Cafarelli, Kazim Orhan Yildiz
Abstract: An apparatus and method are provided including a sheet formed of a transparent material. The sheet defines a template capable of having a pattern printed thereon. During use, the template is adapted for being removed from the sheet. Also included is at least a pair of alignment designators that are positioned on the template of the sheet for marking the material. The markings facilitate alignment of the material in a support frame that is adapted for use when embroidering the pattern on the material.
Type:
Grant
Filed:
April 2, 2001
Date of Patent:
February 17, 2004
Inventors:
Victoria I. Pettigrew, Stephen H. Pettigrew
Abstract: The present invention provides a user configurable computer interface for managing inventory. The interface provides a list, generated according to a user-defined organization. The list includes both owned and un-owned items and provides a means for sampling and purchasing the un-owned items directly from the list. The present invention contemplates a user interface for managing an entertainment play lists such as music play lists, video play lists etc. In addition the present invention contemplates management of vehicle maintenance and goods such as groceries, toys, or books.
Type:
Grant
Filed:
December 28, 1999
Date of Patent:
February 17, 2004
Assignee:
MonkeyMedia, Inc.
Inventors:
Eric J. Gould, Nick West, Donald McCaskill, Alice Cark, Paulus Trisnadi
Abstract: A system, method and article of manufacture are provided for shadow mapping while rendering a primitive in a graphics pipeline. Initially, an offset operation is performed in order to generate a depth value while rendering a primitive. Further, a value of a slope associated with an edge of the primitive is identified. Thereafter, the depth value is conditionally clamped based on the value of the slope.
Abstract: A system and method for minimizing the likelihood of flaws in a firewall proxy is disclosed. Software wrappers are used to introduce fine-grained controls on the operation of existing proxy applications. These fine-grained controls create an extra measure of assurance that bugs (or malicious software) will not subvert the intent of the firewall. To provide even further assurance, the firewall system can be totally wrapped. A totally wrapped system includes a wrapper for the proxies plus a separate wrapper for everything else on the firewall system that can potentially interfere with the wrappers and the proxies. The software wrappers can also be integrated with an intrusion detection system. The fine-grained controls of the software wrapper enables it to be uniquely positioned to generate alerts based on an indication that a flaw exists in the proxy and that the proxy is misbehaving.
Abstract: A system and method are provided for a dedicated hardware-implemented viewport operation in a graphics pipeline. Included is a transform/lighting module for transforming and lighting vertex data. Also provided is viewport hardware coupled to the transform/lighting module for performing a viewport operation on the vertex data. A rasterizer is coupled to the viewport hardware for rendering the vertex data.
Abstract: A system that facilitates customizing a software package by modifying an implementation of a target method defined within an application programming interface (API) for the software package is presented. The system operates by receiving additional code for integration into a target method defined within the API and a command to integrate this code, wherein the API defines a plurality of methods that operate on objects. This command is received through a pre-defined method within the API. In response, the system links the additional code into the target method so that the additional code is executed upon invocation of the target method. In one embodiment the API defines: a method that creates an object; a method that deletes the object; a method that fetches the object; and a method that updates the object. In one embodiment the additional code causes the target method to operate on data from an alternative source.
Abstract: A method and apparatus for detecting and diagnosing wireless network failures, provides for capturing, analyzing, and displaying detailed information relative to data packets and/or frames transmitted across a wireless network including an IEEE 802.11 LAN.
Abstract: A system, method and computer program product are provided for retrieving records in, for example, a computer telephony integration (CTI) architecture. Initially, a telephone call is received from a user. During the telephone call, an identifier associated with the user is ascertained. Information associated with the user is then retrieved utilizing the identifier. The retrieval of information is based on criterion that is customizable.