Patents by Inventor Kan Hsiao

Kan Hsiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230036699
    Abstract: A method of controlling coupling of at least two quantum dots in a quantum dot array is described, wherein the method comprises: determining virtual gates for the quantum dots based on first crosstalk contributions of physical gates to dot potentials of quantum dots in the quantum dot array, a virtual gate voltage defining a linear combination of physical gate voltages to be applied to the physical gates for controlling at least one dot potential of a quantum dot or for controlling a coupling of at least two quantum dots in the quantum dot array, while at least partially compensating dot potential crosstalk due to the first crosstalk contributions; determining second crosstalk contributions of the virtual gates to a coupling between one or more pairs of quantum dots in the quantum dot array, the determining including determining partial derivatives of couplings between pairs of quantum dots in the quantum dot array with respect to the virtual gate voltages; determining enhanced virtual gates for the quantum d
    Type: Application
    Filed: January 21, 2021
    Publication date: February 2, 2023
    Applicant: Technische Universiteit Delft
    Inventors: Cornelis Jacobus VAN DIEPEN, Tzu-Kan HSIAO, Lieven Mark Koenraad VANDERSYPEN
  • Publication number: 20220351063
    Abstract: Methods and systems are described for readout of one or more spin states associated with one or more quantum dots in an array of quantum dots, wherein the method comprises: configuring or providing one or more read-out paths of connected quantum dots in the array of quantum dots, the quantum dots of at least one of the one or more read-out paths being configured close to a charge transition point such that a charge transition in one or more first quantum dots at a first end of the tuned read-out path induces a charge transition in one or more second quantum dots at a second end of the tuned read-out path, the second end being connected to a charge detector; configuring one or more quantum dots of the quantum dot array into a spin-to-charge conversion system connected to the first end of the tuned read-out path, the charge convention system including at least two connected quantum dots hosting a spin state or a quantum dot hosting a spin state connected to a reservoir; and, obtaining information about the spin
    Type: Application
    Filed: December 24, 2020
    Publication date: November 3, 2022
    Applicant: Technische Universiteit Delft
    Inventors: Cornelis Jacobus VAN DIEPEN, Tzu-Kan HSIAO
  • Publication number: 20070061864
    Abstract: The present invention provides a computer-implemented method, system, and program product for managing log-in strikes in a geographically distributed computer infrastructure. Specifically, under the present invention, when a strike message is received on a strikeout server pursuant to an incorrect password input during an attempted log-in of a user, the incorrect password is compared to a strike list to determine if it was previously received on the strikeout server during a predetermined period of time. Based on this determination, the incorrect password and will be stored in a list on the strikeout server with a corresponding timestamp. Thereafter, the strike message and the timestamp will be replicated to all other strikeout servers in the infrastructure.
    Type: Application
    Filed: September 12, 2005
    Publication date: March 15, 2007
    Applicant: International Business Machines Corporation
    Inventors: Bahri Bali, Christopher Barnabo, Gordan Greenlee, Kan Hsiao, Howard Poole, Richard Weingarten
  • Publication number: 20060080450
    Abstract: Under the present invention an audit log for the server environment is obtained and parsed to remove any extraneous information. The parsing operation will typically leave only the previous operations processed by the server environment in the audit log. Thereafter, the parsed audit log is fed back to the server environment. Specifically, each operation in the audit log is fed back to the server environment as a request. Each request will typically have its own thread to simulate concurrent thread activity in the server environment. After the requests have been fed, statistics corresponding to the resulting performance of the server environment will be generated.
    Type: Application
    Filed: June 30, 2004
    Publication date: April 13, 2006
    Applicant: International Business Machines Corporation
    Inventors: Gordan Greenlee, Kan Hsiao, Howard Poole, Joseph Riina, Joe Simons, Richard Weingarten