Patents by Inventor He Yuan
He Yuan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120293343Abstract: Methods for decoding are provided. The proposed method includes steps of: receiving a most probable symbol (MPS) value and a probability value for generating a probability model update; and receiving the probability model update for generating the MPS value and the probability value, wherein when the probability value shows that an MPS is occurred, a path corresponds to the MPS is estimated and a first bin included in the path is decoded beforehand.Type: ApplicationFiled: May 17, 2012Publication date: November 22, 2012Applicant: NATIONAL CHENG KUNG UNIVERSITYInventors: Gwo Giun Lee, He-Yuan Lin, Jia-Wei Liang, Ching-Jui Hsiao
-
Publication number: 20120293499Abstract: A method for depth map generation is disclosed, capable of generating a depth map corresponding an image signal, for the application of a 2D to 3D image transformation system. In the depth map generated by the disclosed method, each of the plural image regions of the image signal is assigned with a depth value. Besides, by means of comparing the depth map with another depth map of the earlier time point, the disclosed method can generate a modulated depth map, for assigning a depth value to each of the plural image regions of the image signal more precisely. Thus, the transformation performance and efficiency of the 2D to 3D image transformation system are hereby improved.Type: ApplicationFiled: April 26, 2012Publication date: November 22, 2012Applicant: National Cheng Kung UniversityInventors: Gwo Giun (Chris) LEE, He-Yuan LIN, Ming-Jiun WANG, Chun-Fu CHEN
-
Publication number: 20120294297Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Are Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: ApplicationFiled: July 31, 2012Publication date: November 22, 2012Applicant: International Business Machines CorporationInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Publication number: 20120294516Abstract: The present invention relates to a method for merging regions in the image/video, capable of merging plural of image regions into an image merging region. In the disclosed method, these image regions are first sequenced basing on their compactness value. Then, one of these image regions is designated as a reference image region, and a merging test process is executed by merging the reference image region with one of the nearby image regions thereof in sequence, for forming a temporal image merging region. Later, the compactness value of the temporal image merging region is compared with the compactness value of the two consisting image regions thereof, respectively. When the compactness value of the temporal image merging region is larger than either one of the compactness value of the two consisting image regions thereof, the temporal image merging region is designated as an image merging region.Type: ApplicationFiled: April 26, 2012Publication date: November 22, 2012Applicant: National Cheng Kung UniversityInventors: Gwo Giun (Chris) LEE, He-Yuan LIN, Chun-Fu CHEN, Ping-Keng JAO
-
Publication number: 20120288000Abstract: A design space exploration method of a reconfigurable motion compensation architecture is disclosed.Type: ApplicationFiled: May 12, 2011Publication date: November 15, 2012Applicant: National Cheng Kung UniversityInventors: Gwo-Giun LEE, Wei-Chiao Yang, He-Yuan Lin, Min-Shan Wu
-
Patent number: 8265027Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: GrantFiled: October 28, 2009Date of Patent: September 11, 2012Assignee: International Business Machines CorporationInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Publication number: 20120222110Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: February 23, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG
-
Publication number: 20120216267Abstract: A method for single sign-on with established federation includes triggering a single sign-on operation from a first service to a second service, retrieving, by the first service, an associated federation key and pseudo identification for a user agent, generating, by the first service, a token signed with a federation key for the user agent based on the pseudo identification, redirecting, by the first service, the user agent to the second service, wherein the user agent transfers the token to the second service, verifying, by the second service, the token and determining an associated identification in the second service, and returning, by the second service, a resource to the user agent.Type: ApplicationFiled: February 23, 2011Publication date: August 23, 2012Applicant: International Business Machines CorporationInventors: Paula K. Austel, He Yuan Huang, Michael McIntosh, Bin Wang, Jing Min Xu
-
Publication number: 20120011186Abstract: A method for quantifying and analyzing intrinsic parallelism of an algorithm is adapted to be implemented by a computer, and includes the steps of: configuring the computer to represent the algorithm by means of a plurality of operation sets; configuring the computer to obtain a Laplacian matrix according to the operation sets; configuring the computer to compute eigenvalues and eigenvectors of the Laplacian matrix; and configuring the computer to obtain a set of information related to intrinsic parallelism of the algorithm according to the eigenvalues and the eigenvectors of the Laplacian matrix.Type: ApplicationFiled: July 8, 2010Publication date: January 12, 2012Applicant: National Cheng Kung UniversityInventors: Gwo-Giun Chris Lee, He-Yuan Lin
-
Publication number: 20110314441Abstract: A method of analyzing intrinsic parallelism of an algorithm, comprising: generating a dataflow graph which is composed of vertexes representing computation and directed edges denoting the dependency and flow of data from the algorithm; building a matrix representing the dataflow graph; and quantifying the intrinsic parallelism based on rank and dimension of the matrix representing the generated dataflow graph.Type: ApplicationFiled: June 22, 2010Publication date: December 22, 2011Inventors: Gwo-Giun Lee, He-Yuan Lin
-
Publication number: 20110265057Abstract: A method of determining a design framework is implemented by an algorithm analyzer. The method includes configuring the algorithm analyzer to perform intrinsic complexity analysis of an algorithm for a predetermined application to obtain a set of parameters representing intrinsic characteristics of the algorithm. The method also includes configuring the algorithm analyzer to establish candidate design frameworks based on the parameters. Each candidate design framework includes a set of design constraints corresponding to the algorithm and which are used when designing a hardware and/or software configuration for implementing the predetermined application. The method also includes configuring the algorithm analyzer to analyze the suitability of the set of design constraints of each candidate design framework based on given specification restrictions of the predetermined application to determine which candidate design framework(s) is suited for the predetermined application.Type: ApplicationFiled: April 21, 2010Publication date: October 27, 2011Applicant: National Cheng Kung UniversityInventors: Gwo-Giun Lee, Ming-Jiun Wang, He-Yuan Lin
-
Publication number: 20110078440Abstract: Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user.Type: ApplicationFiled: September 29, 2010Publication date: March 31, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chen Hua Feng, He Yuan Huang, Xiao Xi Liu, Bin Wang
-
Publication number: 20110069260Abstract: A method for repairing a display panel having a defect is provided, wherein a polarizer has been attached to a surface of the display panel, and the method includes following steps. First, a recess corresponding to the defect is formed at an outer surface of the polarizer. Afterward, a light-shielding material is filled into the recess. Besides, a display panel with a good display quality is also provided.Type: ApplicationFiled: November 13, 2009Publication date: March 24, 2011Applicant: Au Optronics CorporationInventors: He-Yuan Yang, Che-Hsiu Yang, You-Ming Nian, Ching-Yao Chen, Tsung-Yu Wu
-
Publication number: 20110030047Abstract: A method and apparatus for protecting user information. The method includes receiving a request for accessing the user information from an application. When the request does not include an authorized token, the user is requested to temporally confirm the request for access. In response to the confirmation, a token is generated and the user on a mobile service platform is associated with the request for access by the token. The application is then allowed to access the user information based on the token associating the user with the request for accessing the user information from the application.Type: ApplicationFiled: July 30, 2010Publication date: February 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Zhi Guo Gao, He Yuan Huang, Li LI, Rui Xiong Tian
-
Publication number: 20100239017Abstract: A motion estimation method includes: (A) defining one pixel in a reference image as a center of search (CS) corresponding to a target pixel set in a current image; (B) determining a center error (CE) signal; (C) defining another pixel in the reference image as a target of search (TS) with reference to the CS, one candidate search vector available for selection from a vector set, and a step size; (D) determining a target error (TE) signal; (E) determining whether to update the CS and the CE signal; (F) if determined, updating the CS, the CE signal and the vector set; (G) repeating steps (C)˜(F) using a candidate search vector selected from the vector set and the same step size until there is no candidate search vector available for selection in the vector set; (H) repeating steps (C)˜(G) using a smaller step size until a predetermined value is reached; and (I) computing a motion vector based on the target pixel set and one pixel set that includes the CS.Type: ApplicationFiled: March 20, 2009Publication date: September 23, 2010Applicant: NATIONAL CHENG KUNG UNIVERSITYInventors: Gwo-Giun Lee, He-Yuan Lin, Ming-Jiun Wang
-
Publication number: 20100111020Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: ApplicationFiled: October 28, 2009Publication date: May 6, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Publication number: 20090077546Abstract: A method, apparatus, system, and computer program products for implementing non-function logic extensibly and independently of functional logic, the method comprising the steps of: acquiring association relationship between a policy and a required plug-in based on a loaded policy demand configuration; generating a plug-in context definition according to the acquired association relationship, the plug-in context definition being part of a plug-in context associated with the plug-in, wherein the plug-in context defines services provided by the plug-in and reference to other plug-ins related to the plug-in; and generating a plug-in context object based on the plug-in context definition, wherein the plug-in context object is an instantiated plug-in context definition.Type: ApplicationFiled: September 12, 2008Publication date: March 19, 2009Applicant: International Business Machines CorporationInventors: He Yuan Huang, Hua Fang Tan, Jian Xu, Jun Zhu
-
Publication number: 20090037801Abstract: The present invention discloses a method of generating a document, the method including the steps of: recording information of operating an information technology system; putting the information into a document model; and generating the document by mapping the information in the document model. The present invention further discloses a system of generating a document. According to the present invention, the producer of user manual needs to operate an IT system once only, then the user manual of the IT system will be automatically generated. Thus, the producer of the user manual does not have to do repetitive and tedious work any longer, and a large amount of producing time is saved accordingly. Moreover, the style of the user manual can be defined by the producer. According to the present invention, user manuals in different language versions can be easily generated. The generated user manual has a standard format.Type: ApplicationFiled: May 25, 2006Publication date: February 5, 2009Applicant: International Business Machines CorporationInventors: Sheng Ye, Hai chuan Wang, Guan Qun Zhang, He Yuan Huang
-
Publication number: 20090007073Abstract: The present invention provides a service testing method and system using a surrogate. The service testing method comprises steps of: generating, according to service description of a service to be simulated, a service-specific surrogate for said service to be simulated; deploying the generated service-specific surrogate onto a runtime system; specifying a test case by referring to the generated service-specific surrogate, wherein said test case comprises test configuration; and setting, according to the test configuration, a configuration option of the deployed surrogate on the runtime system. In the service testing method and system according to the present invention, parameters of the surrogate are dynamically configured without necessity of rewriting and deployment, thereby reducing the burden of designing and generating Mock objects.Type: ApplicationFiled: April 9, 2008Publication date: January 1, 2009Applicant: International Business Machines CorporationInventors: He Yuan Huang, Shih-Gong Li, Zhong Jie Li, Jun Zhu
-
Publication number: 20080295109Abstract: The present invention provides a component reuse method for reusing at least first component that is selected from a first software system to a second software system. The method comprises the steps of: analyzing the first software system, determining dependencies of the at least one first component of the first software system and acquiring relevant interface information; generating surrogates based on the dependencies and the interface information, which will be deployed in the first operating environment and in the second operating environment respectively, wherein the surrogates allow the second software system to invoke service provided by the at least one first component in the first operating environment and allow the at least one first component to invoke relevant service provided in the second software system.Type: ApplicationFiled: May 6, 2008Publication date: November 27, 2008Inventors: He Yuan Huang, Shih-Gong Li, Hua Fang Tan, Wei Zhao, Jun Zhu