Patents by Inventor He Yuan

He Yuan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120293343
    Abstract: Methods for decoding are provided. The proposed method includes steps of: receiving a most probable symbol (MPS) value and a probability value for generating a probability model update; and receiving the probability model update for generating the MPS value and the probability value, wherein when the probability value shows that an MPS is occurred, a path corresponds to the MPS is estimated and a first bin included in the path is decoded beforehand.
    Type: Application
    Filed: May 17, 2012
    Publication date: November 22, 2012
    Applicant: NATIONAL CHENG KUNG UNIVERSITY
    Inventors: Gwo Giun Lee, He-Yuan Lin, Jia-Wei Liang, Ching-Jui Hsiao
  • Publication number: 20120293499
    Abstract: A method for depth map generation is disclosed, capable of generating a depth map corresponding an image signal, for the application of a 2D to 3D image transformation system. In the depth map generated by the disclosed method, each of the plural image regions of the image signal is assigned with a depth value. Besides, by means of comparing the depth map with another depth map of the earlier time point, the disclosed method can generate a modulated depth map, for assigning a depth value to each of the plural image regions of the image signal more precisely. Thus, the transformation performance and efficiency of the 2D to 3D image transformation system are hereby improved.
    Type: Application
    Filed: April 26, 2012
    Publication date: November 22, 2012
    Applicant: National Cheng Kung University
    Inventors: Gwo Giun (Chris) LEE, He-Yuan LIN, Ming-Jiun WANG, Chun-Fu CHEN
  • Publication number: 20120294297
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Are Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Application
    Filed: July 31, 2012
    Publication date: November 22, 2012
    Applicant: International Business Machines Corporation
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Publication number: 20120294516
    Abstract: The present invention relates to a method for merging regions in the image/video, capable of merging plural of image regions into an image merging region. In the disclosed method, these image regions are first sequenced basing on their compactness value. Then, one of these image regions is designated as a reference image region, and a merging test process is executed by merging the reference image region with one of the nearby image regions thereof in sequence, for forming a temporal image merging region. Later, the compactness value of the temporal image merging region is compared with the compactness value of the two consisting image regions thereof, respectively. When the compactness value of the temporal image merging region is larger than either one of the compactness value of the two consisting image regions thereof, the temporal image merging region is designated as an image merging region.
    Type: Application
    Filed: April 26, 2012
    Publication date: November 22, 2012
    Applicant: National Cheng Kung University
    Inventors: Gwo Giun (Chris) LEE, He-Yuan LIN, Chun-Fu CHEN, Ping-Keng JAO
  • Publication number: 20120288000
    Abstract: A design space exploration method of a reconfigurable motion compensation architecture is disclosed.
    Type: Application
    Filed: May 12, 2011
    Publication date: November 15, 2012
    Applicant: National Cheng Kung University
    Inventors: Gwo-Giun LEE, Wei-Chiao Yang, He-Yuan Lin, Min-Shan Wu
  • Patent number: 8265027
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Grant
    Filed: October 28, 2009
    Date of Patent: September 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Publication number: 20120222110
    Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG
  • Publication number: 20120216267
    Abstract: A method for single sign-on with established federation includes triggering a single sign-on operation from a first service to a second service, retrieving, by the first service, an associated federation key and pseudo identification for a user agent, generating, by the first service, a token signed with a federation key for the user agent based on the pseudo identification, redirecting, by the first service, the user agent to the second service, wherein the user agent transfers the token to the second service, verifying, by the second service, the token and determining an associated identification in the second service, and returning, by the second service, a resource to the user agent.
    Type: Application
    Filed: February 23, 2011
    Publication date: August 23, 2012
    Applicant: International Business Machines Corporation
    Inventors: Paula K. Austel, He Yuan Huang, Michael McIntosh, Bin Wang, Jing Min Xu
  • Publication number: 20120011186
    Abstract: A method for quantifying and analyzing intrinsic parallelism of an algorithm is adapted to be implemented by a computer, and includes the steps of: configuring the computer to represent the algorithm by means of a plurality of operation sets; configuring the computer to obtain a Laplacian matrix according to the operation sets; configuring the computer to compute eigenvalues and eigenvectors of the Laplacian matrix; and configuring the computer to obtain a set of information related to intrinsic parallelism of the algorithm according to the eigenvalues and the eigenvectors of the Laplacian matrix.
    Type: Application
    Filed: July 8, 2010
    Publication date: January 12, 2012
    Applicant: National Cheng Kung University
    Inventors: Gwo-Giun Chris Lee, He-Yuan Lin
  • Publication number: 20110314441
    Abstract: A method of analyzing intrinsic parallelism of an algorithm, comprising: generating a dataflow graph which is composed of vertexes representing computation and directed edges denoting the dependency and flow of data from the algorithm; building a matrix representing the dataflow graph; and quantifying the intrinsic parallelism based on rank and dimension of the matrix representing the generated dataflow graph.
    Type: Application
    Filed: June 22, 2010
    Publication date: December 22, 2011
    Inventors: Gwo-Giun Lee, He-Yuan Lin
  • Publication number: 20110265057
    Abstract: A method of determining a design framework is implemented by an algorithm analyzer. The method includes configuring the algorithm analyzer to perform intrinsic complexity analysis of an algorithm for a predetermined application to obtain a set of parameters representing intrinsic characteristics of the algorithm. The method also includes configuring the algorithm analyzer to establish candidate design frameworks based on the parameters. Each candidate design framework includes a set of design constraints corresponding to the algorithm and which are used when designing a hardware and/or software configuration for implementing the predetermined application. The method also includes configuring the algorithm analyzer to analyze the suitability of the set of design constraints of each candidate design framework based on given specification restrictions of the predetermined application to determine which candidate design framework(s) is suited for the predetermined application.
    Type: Application
    Filed: April 21, 2010
    Publication date: October 27, 2011
    Applicant: National Cheng Kung University
    Inventors: Gwo-Giun Lee, Ming-Jiun Wang, He-Yuan Lin
  • Publication number: 20110078440
    Abstract: Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user.
    Type: Application
    Filed: September 29, 2010
    Publication date: March 31, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chen Hua Feng, He Yuan Huang, Xiao Xi Liu, Bin Wang
  • Publication number: 20110069260
    Abstract: A method for repairing a display panel having a defect is provided, wherein a polarizer has been attached to a surface of the display panel, and the method includes following steps. First, a recess corresponding to the defect is formed at an outer surface of the polarizer. Afterward, a light-shielding material is filled into the recess. Besides, a display panel with a good display quality is also provided.
    Type: Application
    Filed: November 13, 2009
    Publication date: March 24, 2011
    Applicant: Au Optronics Corporation
    Inventors: He-Yuan Yang, Che-Hsiu Yang, You-Ming Nian, Ching-Yao Chen, Tsung-Yu Wu
  • Publication number: 20110030047
    Abstract: A method and apparatus for protecting user information. The method includes receiving a request for accessing the user information from an application. When the request does not include an authorized token, the user is requested to temporally confirm the request for access. In response to the confirmation, a token is generated and the user on a mobile service platform is associated with the request for access by the token. The application is then allowed to access the user information based on the token associating the user with the request for accessing the user information from the application.
    Type: Application
    Filed: July 30, 2010
    Publication date: February 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zhi Guo Gao, He Yuan Huang, Li LI, Rui Xiong Tian
  • Publication number: 20100239017
    Abstract: A motion estimation method includes: (A) defining one pixel in a reference image as a center of search (CS) corresponding to a target pixel set in a current image; (B) determining a center error (CE) signal; (C) defining another pixel in the reference image as a target of search (TS) with reference to the CS, one candidate search vector available for selection from a vector set, and a step size; (D) determining a target error (TE) signal; (E) determining whether to update the CS and the CE signal; (F) if determined, updating the CS, the CE signal and the vector set; (G) repeating steps (C)˜(F) using a candidate search vector selected from the vector set and the same step size until there is no candidate search vector available for selection in the vector set; (H) repeating steps (C)˜(G) using a smaller step size until a predetermined value is reached; and (I) computing a motion vector based on the target pixel set and one pixel set that includes the CS.
    Type: Application
    Filed: March 20, 2009
    Publication date: September 23, 2010
    Applicant: NATIONAL CHENG KUNG UNIVERSITY
    Inventors: Gwo-Giun Lee, He-Yuan Lin, Ming-Jiun Wang
  • Publication number: 20100111020
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Application
    Filed: October 28, 2009
    Publication date: May 6, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Publication number: 20090077546
    Abstract: A method, apparatus, system, and computer program products for implementing non-function logic extensibly and independently of functional logic, the method comprising the steps of: acquiring association relationship between a policy and a required plug-in based on a loaded policy demand configuration; generating a plug-in context definition according to the acquired association relationship, the plug-in context definition being part of a plug-in context associated with the plug-in, wherein the plug-in context defines services provided by the plug-in and reference to other plug-ins related to the plug-in; and generating a plug-in context object based on the plug-in context definition, wherein the plug-in context object is an instantiated plug-in context definition.
    Type: Application
    Filed: September 12, 2008
    Publication date: March 19, 2009
    Applicant: International Business Machines Corporation
    Inventors: He Yuan Huang, Hua Fang Tan, Jian Xu, Jun Zhu
  • Publication number: 20090037801
    Abstract: The present invention discloses a method of generating a document, the method including the steps of: recording information of operating an information technology system; putting the information into a document model; and generating the document by mapping the information in the document model. The present invention further discloses a system of generating a document. According to the present invention, the producer of user manual needs to operate an IT system once only, then the user manual of the IT system will be automatically generated. Thus, the producer of the user manual does not have to do repetitive and tedious work any longer, and a large amount of producing time is saved accordingly. Moreover, the style of the user manual can be defined by the producer. According to the present invention, user manuals in different language versions can be easily generated. The generated user manual has a standard format.
    Type: Application
    Filed: May 25, 2006
    Publication date: February 5, 2009
    Applicant: International Business Machines Corporation
    Inventors: Sheng Ye, Hai chuan Wang, Guan Qun Zhang, He Yuan Huang
  • Publication number: 20090007073
    Abstract: The present invention provides a service testing method and system using a surrogate. The service testing method comprises steps of: generating, according to service description of a service to be simulated, a service-specific surrogate for said service to be simulated; deploying the generated service-specific surrogate onto a runtime system; specifying a test case by referring to the generated service-specific surrogate, wherein said test case comprises test configuration; and setting, according to the test configuration, a configuration option of the deployed surrogate on the runtime system. In the service testing method and system according to the present invention, parameters of the surrogate are dynamically configured without necessity of rewriting and deployment, thereby reducing the burden of designing and generating Mock objects.
    Type: Application
    Filed: April 9, 2008
    Publication date: January 1, 2009
    Applicant: International Business Machines Corporation
    Inventors: He Yuan Huang, Shih-Gong Li, Zhong Jie Li, Jun Zhu
  • Publication number: 20080295109
    Abstract: The present invention provides a component reuse method for reusing at least first component that is selected from a first software system to a second software system. The method comprises the steps of: analyzing the first software system, determining dependencies of the at least one first component of the first software system and acquiring relevant interface information; generating surrogates based on the dependencies and the interface information, which will be deployed in the first operating environment and in the second operating environment respectively, wherein the surrogates allow the second software system to invoke service provided by the at least one first component in the first operating environment and allow the at least one first component to invoke relevant service provided in the second software system.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 27, 2008
    Inventors: He Yuan Huang, Shih-Gong Li, Hua Fang Tan, Wei Zhao, Jun Zhu