Patents by Inventor Erez Zadok
Erez Zadok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9959279Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.Type: GrantFiled: April 20, 2016Date of Patent: May 1, 2018Assignee: THE RESEARCH FOUNDATION FOR THE STATE UNIVERSITY OF NEW YORKInventors: Shrikar Archak, Sagar Dixit, Richard P. Spillane, Erez Zadok
-
Publication number: 20160232169Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.Type: ApplicationFiled: April 20, 2016Publication date: August 11, 2016Inventors: SHRIKAR ARCHAK, SAGAR DIXIT, RICHARD P. SPILLANE, EREZ ZADOK
-
Publication number: 20160230237Abstract: A method for identification of circulating tumor cells (CTCs) in a blood sample uses magnetic enrichment and a nanowell assay. The CTCs are magnetically labeled with cancer cell markers conjugated to magnetic nanoparticles and then separated by passing the blood sample through a magnetic sifter. The enriched CTCs are then loaded into a microfluidic single-cell molecular assay comprising an array of 25,600 or more nanowells, each containing at most a single one of the CTCs. Using multiple fluorescent gene markers, simultaneous multiple-color multiplexed gene expression of the CTCs is performed, preferably using RT-PCR. Images of fluorescence signals from individual nanowells are analyzed to identify CTCs.Type: ApplicationFiled: April 20, 2016Publication date: August 11, 2016Inventors: Seung Min Park, Sugar Dixit, Richard P. Spillane, Erez Zadok
-
Patent number: 9355109Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.Type: GrantFiled: June 13, 2011Date of Patent: May 31, 2016Assignee: The Research Foundation For the State University of New YorkInventors: Shrikar Archak, Sagar Dixit, Richard P. Spillane, Erez Zadok
-
Publication number: 20120072656Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.Type: ApplicationFiled: June 13, 2011Publication date: March 22, 2012Inventors: Shrikar Archak, Sagar Dixit, Richard P. Spillane, Erez Zadok
-
Patent number: 7979907Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.Type: GrantFiled: December 18, 2008Date of Patent: July 12, 2011Assignee: The Trustees of Columbia University in the City of New YorkInventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo Salvatore J.
-
Publication number: 20090254992Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.Type: ApplicationFiled: December 18, 2008Publication date: October 8, 2009Inventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo Salvatore J.
-
Patent number: 7487544Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.Type: GrantFiled: July 30, 2002Date of Patent: February 3, 2009Assignee: The Trustees of Columbia University in the city of New YorkInventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo J. Salvatore
-
Publication number: 20050273858Abstract: An operating system kernel, including a protocol stack, includes a network layer for receiving a message from a data network, a stackable file system layer coupled to the network layer for inspecting the message, wherein the stackable file system layer is coupled to a storage device, the stackable file system determining and storing file system level information determined from the message, and a wrapped file system comprising a file targeted by the message coupled to the stackable file system layer for receiving the message inspected by the stackable file system.Type: ApplicationFiled: June 7, 2004Publication date: December 8, 2005Inventors: Erez Zadok, Charles Wright, Akshat Aranya, Abhijith Das, Yevgeniy Miretskiy, Kiran-Kumar Muniswamy-Reddy, Andrew Himmer
-
Publication number: 20030065926Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.Type: ApplicationFiled: July 30, 2002Publication date: April 3, 2003Inventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo J. Salvatore