Patents by Inventor Abhishek Singh
Abhishek Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130132315Abstract: Various methods and systems are provided for classification using correntropy. In one embodiment, a classifying device includes a processing unit and memory storing instructions in modules that when executed by the processing unit cause the classifying device to adaptively classify a data value using a correntropy loss function. In another embodiment, a method includes adjusting a weight of a classifier based at least in part on a change in a correntropy loss function signal and classifying a data value using the classifier. In another embodiment, a method includes classifying a data value by predicting a label for the data value using a discriminant function, determining a correntopy statistical similarity between the predicted label and an actual label based at least in part on a correntropy loss function, and minimizing an expected risk associated with the predicted label based at least in part on a correntropy statistical similarity.Type: ApplicationFiled: July 22, 2011Publication date: May 23, 2013Inventors: Jose Carlos Principe, Abhishek Singh
-
Publication number: 20130109333Abstract: A system and method for diversity implementation are provided, where diversity gains are obtained by using a hybrid of the switching technique and the combining technique in conjunction with the use of a modal antenna. The antenna system includes multiple antennas including at least one modal antenna that has multiple modes, and a processor for selecting one or more modes from the multiple modes associated with each of the at least one modal antenna, combining modes to form one or more combinations of modes, the modes in each of the one or more combinations including one of the one or more selected modes associated with each of the at least one modal antenna, and selecting one of the one or more combinations that optimizes correlation and/or a quality metric for diversity.Type: ApplicationFiled: July 25, 2012Publication date: May 2, 2013Inventors: Sebastian Rowson, Jeffrey Shamblin, Laurent Desclos, Abhishek Singh
-
Publication number: 20130110437Abstract: A method, in one embodiment, can include modeling and calibrating two types of sensors that are part of a semiconductor device. In addition, the method can include determining a temperature and voltage based on data received from the two sensors.Type: ApplicationFiled: January 25, 2012Publication date: May 2, 2013Applicant: NVIDIA CORPORATIONInventors: Abhishek Singh, Wojciech Jakub Poppe, Ilyas Elkin
-
Patent number: 8312463Abstract: This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.Type: GrantFiled: March 30, 2010Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Burton J. Smith, David Probert, Abhishek Singh, Douglas Burger, David Wecker
-
Publication number: 20120127995Abstract: A source device obtains a data packet that includes both a destination address and a payload. The source device selects an exit point address of multiple exit point addresses corresponding to the destination address based on one or more policies. The source device encapsulates the data packet with a header that includes the selected exit point address, and the encapsulated data packet is provided to the backbone network. The encapsulated data packet is routed through the backbone network based on the exit point address, and an edge router of the backbone network identifies an interface of the edge router that corresponds to the exit point address. The header is removed from the encapsulated data packet, and the data packet is added to a buffer of the interface for routing to one or more other devices outside of the backbone network.Type: ApplicationFiled: November 18, 2010Publication date: May 24, 2012Applicant: MICROSOFT CORPORATIONInventors: Abhishek Singh, Ming Zhang, Albert G. Greenberg, Parantap Lahiri, David A. Maltz, Srinivas Krishnan
-
Publication number: 20120110557Abstract: A server device is configured to receive a request to identify a manner in which changed code propagates within an application; generate a group of blocks that correspond to code associated with a parent function corresponding to the application and which includes the changed code; perform an intra-procedural analysis on the group of blocks to identify a block that is affected by the changed code included within an epicenter block; perform an inter-procedural analysis on functions associated with the block, where, when performing the inter-procedural analysis, the server device is to generate another group of blocks associated with the functions, and identify another block that is affected by the changed code included within the epicenter block; and present, for display, information associated with the block or the other block that enables the application to be tested based on the block or the other block.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Abhishek SINGH, Sachin VASUDEVA
-
Publication number: 20120047121Abstract: A client application installed on end user computers generates metadata from the content of web pages visited by end users and provides the metadata to a search engine. When an end user visits a web page, the end user's computer downloads and displays the web page to the end user. The client application may simultaneously access the web page content and generate this metadata in the form of a content signature of the web page from the web page content. The client application then provides the content signature to a search engine. The search engine may employ content signatures to identify new web pages to crawl and index. Additionally, the search engine may employ content signatures to identify changes to web pages and determine the crawl frequency of web pages.Type: ApplicationFiled: August 23, 2010Publication date: February 23, 2012Applicant: MICROSOFT CORPORATIONInventors: FABRICE CANEL, JUNAID AHMED, THOMAS FRANCIS MCELROY, WALTER SUN, KUMAR CHELLAPILLA, ABHISHEK SINGH, VISHNU CHALLAM
-
Publication number: 20120011493Abstract: A human-readable list of patch differences ranked by weight helps vulnerability analysts allocate their time. From binary code, identified source functions and recognized sink functions are used when assigning relative weights to changes caused by a patch. Source functions are identified using an export table, import table, and remote procedure call interface. Sink functions are recognized using blacklisted functions, patch-targeted functions, memory functions, string functions, and functions called with mismatched parameters. A change prioritizer assigns weights based on an architectural graph and a set of prioritization rules that specify what kind of change is made by a patch, and what kind of function is changed. Weight assignments may be additive. Rules may assign certain kinds of change a higher priority for subsequent scrutiny by an analyst.Type: ApplicationFiled: July 8, 2010Publication date: January 12, 2012Applicant: Microsoft CorporationInventors: Abhishek Singh, Tanmay Ganacharya, Scott Lambert
-
Publication number: 20120003901Abstract: The present disclosure is directed to a highly dilutable chemical mechanical polishing concentrate comprising an abrasive, an acid, a stabilizer, and water with a point-of-use pH ranging from 2.2-3.5 for planarizing current and next generation semiconductor integrated circuit FEOL/BEOL substrates.Type: ApplicationFiled: July 1, 2010Publication date: January 5, 2012Inventors: Bin Hu, Abhishek Singh, Gert Moyaerts, Deepak Mahulikar, Richard Wen
-
Patent number: 8086847Abstract: An encrypted request for peer-to-peer communication includes a requesting peer encrypting a requested peer identification using a public key of a security agent. The requesting peer sends the encrypted request to a security agent, which generates a first encrypted instance of the session key using a public key of the requested peer and a second encrypted instance of the session key using a public key of the requesting peer. The first encrypted instance of the session key is sent to the requested peer and the second encrypted instance of the session key is sent to the requesting peer. The requesting peer encrypts data using the second encrypted instance of the session key and sends the encrypted data to the requested peer, which decrypts the encrypted data using the first instance of the encrypted session key.Type: GrantFiled: July 13, 2009Date of Patent: December 27, 2011Assignee: International Business Machines CorporationInventor: Abhishek Singh
-
Publication number: 20110295844Abstract: Methods, systems, and computer-storage media for improving the freshness, or the apparent freshness, of search results are described. In an embodiment, the first portion of search results presented on a search results page are based on responsiveness to the search query and a second portion of results describe only recently published documents that are responsive to the search query. In an embodiment, a more recent version of the document, which is not directly used to determine responsiveness, is used to build the caption for a search result. Another way to make search results appear fresh is to include a publication time within the search result caption. In one embodiment, the publication time is generated by calculating a point in time between when a document is first added to a search index and the previous time the search engine visited the site where the document was found.Type: ApplicationFiled: May 27, 2010Publication date: December 1, 2011Applicant: MICROSOFT CORPORATIONInventors: WALTER SUN, THOMAS ARTHUR LEDBETTER, VINAY SUDHIR DESHPANDE, YINZHE YU, LIN GUO, ABHISHEK SINGH, JUNAID AHMED, JAY KUMAR GOYAL, JINGFENG LI, BRAHM KIRAN SINGH
-
Publication number: 20110247001Abstract: This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.Type: ApplicationFiled: March 30, 2010Publication date: October 6, 2011Applicant: Microsoft CorporationInventors: Burton J. Smith, David Probert, Abhishek Singh, Douglas Burger, David Wecker
-
Patent number: 7837779Abstract: A bioadhesive composition from distillers' dried grains with solubles (DDGS) is produced by reaction with an aqueous solution of a base, particularly, sodium hydroxide. Optionally, urea is included with the base. The bioadhesive composition is filtered as a solution from the residue of the reaction with the base. The bioadhesive composition is particularly useful as a boxboard glue.Type: GrantFiled: October 15, 2009Date of Patent: November 23, 2010Assignee: Board of Trustees of Michigan State UniversityInventors: Amar K. Mohanty, Qiangxian Wu, Abhishek Singh
-
Publication number: 20100287613Abstract: Methods, systems, and computer-readable media are disclosed for packet sanitization. A particular method intercepts a packet of a packet stream, where the packet stream is transmitted in accordance with a particular protocol. The packet is analyzed based on a specification associated with the particular protocol. Based on the analysis, a data value of a field of the packet is replaced with a sanitized data value to create a sanitized packet. The sanitized packet may be injected into the packet stream or may optionally be forwarded to a signature module that checks the sanitized packet for malicious content. When malicious content is found, the sanitized packet may be dropped, the sanitized packet may be logged, the sanitized packet may be redirected, or a notification regarding the sanitized packet may be sent to an administrator.Type: ApplicationFiled: May 8, 2009Publication date: November 11, 2010Applicant: Microsoft CorporationInventors: Abhishek Singh, Tanmay A. Ganacharya, Scott Lambert, Nikola J. Livic, Swapnil Bhalode
-
Publication number: 20100031849Abstract: A bioadhesive composition from distillers' dried grains with solubles (DDGS) is produced by reaction with an aqueous solution of a base, particularly, sodium hydroxide. Optionally, urea is included with the base. The bioadhesive composition is filtered as a solution from the residue of the reaction with the base. The bioadhesive composition is particularly useful as a boxboard glue.Type: ApplicationFiled: October 15, 2009Publication date: February 11, 2010Applicant: Board of Trustees of Michigan State UniversityInventors: Amar K. Mohanty, Qiangxian Wu, Abhishek Singh
-
Publication number: 20100023766Abstract: A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security agent (110) generates unique session keys for communication between peers (120, 130, 140). The security agent (110) removes the burden of mutual authentication between requested peer (130, 140) and the requesting peer (120), as the security agent (110) independently authenticates the requesting peer (120) and the requested peer (130, 140). The requested peer (130, 140) and the requesting peer (120) are sent a session key by the security agent (110).Type: ApplicationFiled: July 13, 2009Publication date: January 28, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Abhishek Singh
-
Patent number: 7652440Abstract: A low cost switching system for an electrical motor, which is speed sensitive, direction of rotation insensitive, load insensitive and voltage fluctuation insensitive. The switch contains a power supply, a control circuit, a zero cross detector circuit, a triggering circuit and an electronic switch to provide the switching action. A time delay hysteresis inducement circuit is provided in the switching system to energized and deenergized the capacitor at a predetermined synchronous speed of the motor. The switching system first checks the speed of the motor before reenergizing the start capacitor, which increases the life of the motor. The switching system operates in high temperature range and regardless the value of the capacitor used.Type: GrantFiled: June 8, 2006Date of Patent: January 26, 2010Inventor: Abhishek Singh
-
Patent number: 7618660Abstract: A bioadhesive composition from distillers' dried grains with solubles (DDGS) is produced by reaction with an aqueous solution of a base, particularly, sodium hydroxide. Optionally, urea is included with the base. The bioadhesive composition is filtered as a solution from the residue of the reaction with the base. The bioadhesive composition s particularly useful as a boxboard glue.Type: GrantFiled: February 16, 2007Date of Patent: November 17, 2009Assignee: Board of Trustees of Michigan State UniversityInventors: Amar K. Mohanty, Qiangxian Wu, Abhishek Singh
-
Patent number: 7596690Abstract: A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security agent (110) generates unique session keys for communication between peers (120, 130, 140). The security agent (110) removes the burden of mutual authentication between requested peer (130, 140) and the requesting peer (120), as the security agent (110) independently authenticates the requesting peer (120) and the requested peer (130, 140). The requested peer (130, 140) and the requesting peer (120) are sent a session key by the security agent (110).Type: GrantFiled: September 9, 2004Date of Patent: September 29, 2009Assignee: International Business Machines CorporationInventor: Abhishek Singh
-
Publication number: 20090128082Abstract: A low cost switching system for an electrical motor, which is speed sensitive, direction of rotation insensitive, load insensitive and voltage fluctuation insensitive. The switch contains a power supply, a control circuit, a zero cross detector circuit, a triggering circuit and an electronic switch to provide the switching action. A time delay hysterisis inducement circuit is provided in the switching system to energized and deenergized the capacitor at a predetermined synchronous speed of the motor. The switching system first checks the speed of the motor before reenergizing the start capacitor, which increases the life of the motor. The switching system operates in high temperature range and regardless the value of the capacitor used.Type: ApplicationFiled: June 8, 2006Publication date: May 21, 2009Inventor: Abhishek Singh