Patents by Inventor Jayaraman Iyer
Jayaraman Iyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11968546Abstract: A method for wireless communication includes a first wireless communication device receiving, from a second wireless communication device, one or more signals for each of a plurality of candidate sensing beams and a transmission beam. The method also includes determining, for each of the plurality of candidate sensing beams based on at least one of the one or more signals for the respective candidate sensing beam, a first signal measurement. The method also includes determining, based on at least one of the one or more signals for the transmission beam, a second signal measurement with respect to a direction of the transmission beam, and determining, for each of the plurality of candidate sensing beams based on the respective first signal measurement and the second signal measurement, beam coverage information with respect to the transmission beam direction.Type: GrantFiled: March 10, 2022Date of Patent: April 23, 2024Assignee: QUALCOMM IncorporatedInventors: Giovanni Chisci, Jing Sun, Arumugam Chendamarai Kannan, Vinay Chande, Sumant Jayaraman Iyer, Marco Papaleo, Tao Luo, Aleksandar Damnjanovic, Xiaoxia Zhang
-
Publication number: 20240121626Abstract: A user equipment (UE) may transmit, to a primary cell, an indication of a capability to synchronize with a secondary cell based on measurements of the primary cell. A UE may estimate a propagation delay (tp) and an angle of arrival (AoA) of the secondary cell based on a synchronization signal block (SSB) or a channel state information reference signal (CSI-RS) transmitted by the primary cell. A UE may perform automatic gain control (AGC), fine timing synchronization, and fine frequency synchronization of the secondary cell based on a temporary aperiodic tracking reference signal (A-TRS) transmitted by the secondary cell. A UE may perform a receive beam sweep on a burst of a CSI-RS transmitted by the secondary cell, wherein a range of the receive beam sweep is based on the estimated AoA.Type: ApplicationFiled: October 9, 2023Publication date: April 11, 2024Inventors: Konstantinos Dimou, Changhwan Park, Ruhua He, Sumant Jayaraman Iyer, Jianghong Luo
-
Publication number: 20240089967Abstract: Methods, systems, and devices for wireless communications are described. In some aspects, a user equipment (UE) may receive an indication of a set of channel measurement resources (CMRs) that are configured for a group-based reference signal measurement for multiple transmission and reception points (TRPs). The UE may identify or determine whether a set of one or more directional beams used by the UE to measure reference signal transmissions from each of the multiple TRPs satisfy a threshold directivity gain. The UE may transmit a request to enable a scheduling restriction at the UE for a time period associated with the group-based reference signal measurement if the set of directional beams fail to satisfy the threshold directivity gain and may transmit a request to disable the scheduling restriction if the set of directional beams satisfy the threshold directivity gain.Type: ApplicationFiled: September 8, 2022Publication date: March 14, 2024Inventors: Changhwan Park, Sumant Jayaraman Iyer, Mostafa Khoshnevisan, Yan Zhou
-
Patent number: 11868886Abstract: One or more computing devices, systems, and/or methods for generating time-preserving embeddings are provided. User trails of user activities performed by users are generated. Frequencies at which the activities were performed are identified. Indices are assigned to a set of activities identified from the activities as having frequencies above a threshold. Activity descriptions of the set of activities are mapped to the indices to generate a vocabulary. A model is trained using the user trails, timestamps of the activities, and the vocabulary to learn a set of time-preserving embeddings.Type: GrantFiled: January 25, 2021Date of Patent: January 9, 2024Assignee: Yahoo Assets LLCInventors: Jelena Gligorijevic, Ivan Stojkovic, Martin Pavlovski, Shubham Agrawal, Djordje Gligorijevic, Srinath Ravindran, Richard Hin-Fai Tang, Shabhareesh Komirishetty, Chander Jayaraman Iyer, Lakshmi Narayan Bhamidipati
-
Publication number: 20230418829Abstract: One or more computing devices, systems, and/or methods are provided. In an example, an internet resource identification item associated with one or more internet resources may be identified. User activity information associated with a plurality of events may be analyzed to determine a plurality of sets of text associated with the internet resource identification item, wherein each set of text of the plurality of sets of text is associated with an event, of the plurality of events, associated with an internet resource of the one or more internet resources. A plurality of term representations may be determined based upon the plurality of sets of text. A user intention-based representation associated with the internet resource identification item may be generated based upon the plurality of term representations. A content item may be selected for presentation via a client device based upon the user intention-based representation.Type: ApplicationFiled: September 11, 2023Publication date: December 28, 2023Inventors: Chander Jayaraman Iyer, Ivan Stojkovic, Eric Ye, Lakshmi Narayan Bhamidipati, Srinath Ravindran, Shubham Agrawal
-
Patent number: 11755594Abstract: One or more computing devices, systems, and/or methods are provided. In an example, an internet resource identification item associated with one or more internet resources may be identified. User activity information associated with a plurality of events may be analyzed to determine a plurality of sets of text associated with the internet resource identification item, wherein each set of text of the plurality of sets of text is associated with an event, of the plurality of events, associated with an internet resource of the one or more internet resources. A plurality of term representations may be determined based upon the plurality of sets of text. A user intention-based representation associated with the internet resource identification item may be generated based upon the plurality of term representations. A content item may be selected for presentation via a client device based upon the user intention-based representation.Type: GrantFiled: April 13, 2022Date of Patent: September 12, 2023Assignee: Yahoo Ad Tech LLCInventors: Chander Jayaraman Iyer, Ivan Stojkovic, Eric Ye, Lakshmi Narayan Bhamidipati, Srinath Ravindran, Shubham Agrawal
-
Publication number: 20230039328Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit an indication of support for selectively using transmission diversity for communicating. The UE may transmit one or more communications selectively using transmission diversity. Numerous other aspects are described.Type: ApplicationFiled: March 29, 2022Publication date: February 9, 2023Inventors: Timo Ville VINTOLA, Sumant Jayaraman IYER, Masato KITAZOE, Juan MONTOJO, Yi HUANG, Peter GAAL
-
Patent number: 11569886Abstract: Methods, systems, and devices for wireless communications are described. A transmitting device, which may be an example of a user equipment and/or a base station, may receive a signal from a receiving device indicating an antenna topology supported by the receiving device. The transmitting device may select, based at least in part on the antenna topology, a diversity scheme for performing a wireless transmission to the receiving device, the diversity scheme including one or more diversity types from a plurality of diversity types. The transmitting device may transmit the wireless transmission to the receiving device employing the selected diversity scheme.Type: GrantFiled: March 26, 2020Date of Patent: January 31, 2023Assignee: QUALCOMM IncorporatedInventors: Sumant Jayaraman Iyer, Timo Ville Vintola, Peter Gaal
-
Publication number: 20220369125Abstract: A method for wireless communication includes a first wireless communication device receiving, from a second wireless communication device, one or more signals for each of a plurality of candidate sensing beams and a transmission beam. The method also includes determining, for each of the plurality of candidate sensing beams based on at least one of the one or more signals for the respective candidate sensing beam, a first signal measurement. The method also includes determining, based on at least one of the one or more signals for the transmission beam, a second signal measurement with respect to a direction of the transmission beam, and determining, for each of the plurality of candidate sensing beams based on the respective first signal measurement and the second signal measurement, beam coverage information with respect to the transmission beam direction.Type: ApplicationFiled: March 10, 2022Publication date: November 17, 2022Inventors: Giovanni CHISCI, Jing SUN, Arumugam CHENDAMARAI KANNAN, Vinay CHANDE, Sumant Jayaraman IYER, Marco PAPALEO, Tao LUO, Aleksandar DAMNJANOVIC, Xiaoxia ZHANG
-
Patent number: 11412000Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.Type: GrantFiled: January 14, 2020Date of Patent: August 9, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Michel Khouderchah, Jayaraman Iyer, Kent K. Leung, Jianxin Wang, Donovan O'Hara, Saman Taghavi Zargar, Subharthi Paul
-
Publication number: 20220237442Abstract: One or more computing devices, systems, and/or methods for generating time-preserving embeddings are provided. User trails of user activities performed by users are generated. Frequencies at which the activities were performed are identified. Indices are assigned to a set of activities identified from the activities as having frequencies above a threshold. Activity descriptions of the set of activities are mapped to the indices to generate a vocabulary. A model is trained using the user trails, timestamps of the activities, and the vocabulary to learn a set of time-preserving embeddings.Type: ApplicationFiled: January 25, 2021Publication date: July 28, 2022Inventors: Jelena Gligorijevic, Ivan Stojkovic, Martin Pavlovski, Shubham Agrawal, Djordje Gligorijevic, Srinath Ravindran, Richard Hin-Fai Tang, Shabhareesh Komirishetty, Chander Jayaraman Iyer, Lakshmi Narayan Bhamidipati
-
Patent number: 11233742Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.Type: GrantFiled: November 5, 2019Date of Patent: January 25, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Samir Dilipkumar Saklikar, Jayaraman Iyer, Robin Edgard Martherus, Morteza Ansari, Jyoti Verma
-
Patent number: 11095670Abstract: In one example embodiment, a network management device generates a first script defining a first function for detecting a first customizable network event in a sequence of customizable network events indicative of a security threat to a network. The network management device activates the first script at a first network device in the network so as to cause the first network device to execute the first function for detecting the first customizable network event, and obtains, from the first network device, one or more indications that the first network device has detected the first customizable network event. Based on the one or more indications, the network management device determines whether to activate a second script defining a second function for detecting a second customizable network event in the sequence at a second network device in the network capable of detecting the second customizable network event.Type: GrantFiled: July 9, 2018Date of Patent: August 17, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Subharthi Paul, Saman Taghavi Zargar, Jayaraman Iyer, Hari Shankar
-
Publication number: 20210218771Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.Type: ApplicationFiled: January 14, 2020Publication date: July 15, 2021Inventors: Michel Khouderchah, Jayaraman Iyer, Kent K. Leung, Jianxin Wang, Donovan O'Hara, Saman Taghavi Zargar, Subharthi Paul
-
Publication number: 20210135995Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.Type: ApplicationFiled: November 5, 2019Publication date: May 6, 2021Inventors: Samir Dilipkumar Saklikar, Jayaraman Iyer, Robin Edgard Martherus, Morteza Ansari, Jyoti Verma
-
Publication number: 20210103953Abstract: One or more computing devices, systems, and/or methods are provided. A user profile database may be analyzed to identify a first plurality of user profiles and/or a second plurality of user profiles. A user profile of the first plurality of user profiles may be indicative of activity associated with a content item of the one or more first content items when the one or more first content items are trending. A user profile of the second plurality of user profiles may be indicative of activity associated with a content item of the one or more first content items when the one or more first content items are not trending. A first conversion score associated with a first entity may be determined based upon the first plurality of user profiles. A second conversion score associated with the first entity may be determined based upon the second plurality of user profiles.Type: ApplicationFiled: October 8, 2019Publication date: April 8, 2021Inventors: Chander Jayaraman Iyer, Srinath Ravindran, Sainath Subramanya Vellal, Lakshmi Narayan Bhamidipati
-
Patent number: 10912040Abstract: Methods, systems, and devices for wireless communications are described. A base station may determine an emissions mask (e.g., an in-band emission (IBE) mask) for a user equipment (UE) which may be determined based on the total number of UEs scheduled by the base station for uplink transmissions during a same transmission time interval (TTI). The base station may transmit downlink control information (DCI) to the UE indicating the emissions mask. The base station may additionally transmit a grant to the UE allocating resources for the UE based on the UE's position relative to other UEs served by the base station. The UE may receive the DCI and may map the emissions mask to a maximum power reduction (MPR). Based on the MPR, the UE may determine a transmit power and may transmit an uplink transmission to the base station according to the transmission power and the DCI.Type: GrantFiled: December 12, 2018Date of Patent: February 2, 2021Assignee: QUALCOMM IncorporatedInventors: Alessio Marcone, Marco Papaleo, Valentin Alexandru Gheorghiu, Sumant Jayaraman Iyer, Timo Ville Vintola
-
Publication number: 20200313738Abstract: Methods, systems, and devices for wireless communications are described. A transmitting device, which may be an example of a user equipment and/or a base station, may receive a signal from a receiving device indicating an antenna topology supported by the receiving device. The transmitting device may select, based at least in part on the antenna topology, a diversity scheme for performing a wireless transmission to the receiving device, the diversity scheme including one or more diversity types from a plurality of diversity types. The transmitting device may transmit the wireless transmission to the receiving device employing the selected diversity scheme.Type: ApplicationFiled: March 26, 2020Publication date: October 1, 2020Inventors: Sumant Jayaraman Iyer, Timo Ville Vintola, Peter Gaal
-
Publication number: 20200196250Abstract: Methods, systems, and devices for wireless communications are described. A base station may determine an emissions mask (e.g., an in-band emission (IBE) mask) for a user equipment (UE) which may be determined based on the total number of UEs scheduled by the base station for uplink transmissions during a same transmission time interval (TTI). The base station may transmit downlink control information (DCI) to the UE indicating the emissions mask. The base station may additionally transmit a grant to the UE allocating resources for the UE based on the UE's position relative to other UEs served by the base station. The UE may receive the DCI and may map the emissions mask to a maximum power reduction (MPR). Based on the MPR, the UE may determine a transmit power and may transmit an uplink transmission to the base station according to the transmission power and the DCI.Type: ApplicationFiled: December 12, 2018Publication date: June 18, 2020Inventors: Alessio Marcone, Marco Papaleo, Valentin Alexandru Gheorghiu, Sumant Jayaraman Iyer, Timo Ville Vintola
-
Patent number: 10659484Abstract: In one embodiment, a centralized controller maintains a plurality of hierarchical behavioral modules of a behavioral model, and distributes initial behavioral modules to data plane entities to cause them to apply the initial behavioral modules to data plane traffic. The centralized controller may then receive data from a particular data plane entity based on its having applied the initial behavioral modules to its data plane traffic. The centralized controller then distributes subsequent behavioral modules to the particular data plane entity to cause it to apply the subsequent behavioral modules to the data plane traffic, the subsequent behavioral modules selected based on the previously received data from the particular data plane entity. The centralized controller may then iteratively receive data from the particular data plane entity and distribute subsequently selected behavioral modules until an attack determination is made on the data plane traffic of the particular data plane entity.Type: GrantFiled: February 19, 2018Date of Patent: May 19, 2020Assignee: Cisco Technology, Inc.Inventors: Saman Taghavi Zargar, Subharthi Paul, Prashanth Patil, Jayaraman Iyer, Hari Shankar