Patents by Inventor Mathew Thomas
Mathew Thomas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11802659Abstract: A ceiling electrical box can include a housing and a bracket. The housing is defined by a rear wall at a first end, at least one sidewall, and an opening at a second end and includes a first emboss tab, a second emboss tab, a pair of screw holes, a pair of first bores, and a pair of second bores. The bracket includes a first portion, a second portion, a pair of first threaded apertures, and a pair of second threaded apertures. The bracket can include a third portion and a fourth portion extending on a first plane of the first portion. The ceiling electrical box can also include a pair of first fasteners to attach the housing to the bracket and a pair of second fasteners to engage the bracket through the housing, the second fasteners configured to receive a fixture plate for a ceiling fixture.Type: GrantFiled: June 15, 2022Date of Patent: October 31, 2023Assignee: ABB Schweiz AGInventors: Mathew Thomas, James Wolfe, Michael O'Neil
-
Patent number: 11743352Abstract: Provided is a method for selecting a service provider for an application. The method includes detecting a plurality of available service providers for an application running on a computing device. The method further includes comparing service information for each of the plurality of service providers to a set of service provider selection factors for the application. The method further includes selecting a first service provider of the plurality of service providers to provide service for the application.Type: GrantFiled: May 26, 2022Date of Patent: August 29, 2023Assignee: International Business Machines CorporationInventors: Mathews Thomas, Sai Srinivas Gorti, Sharath Prasad Krishna Prasad, Amandeep Singh, Praveen Jayachandran, Dushyant K. Behl, Mudit Verma, Utpal Mangla, Steven Layne Canepa
-
Patent number: 11720548Abstract: Systems, devices, and methods are provided for implementing shadow data lakes. In at least one embodiment, a deletion workflow obtains a deletion request from a delete request cache service, gets attestation details from an attestation service, submits a job to scan one or more records from a source table of a data lake and publish the one or more records to a deleted records table of a shadow data lake, and cause deletion of the one or more records from the data lake.Type: GrantFiled: March 18, 2021Date of Patent: August 8, 2023Assignee: Amazon Technologies, Inc.Inventors: Daniel Opincariu, Yangbae Park, Sanjay Mathew Thomas
-
Publication number: 20230148225Abstract: Joint denoising and supersampling of graphics data is described. An example of a graphics processor includes multiple processing resources, including a least a first processing resource including a pipeline to perform a supersampling operation; and the pipeline including circuitry to jointly perform denoising and supersampling of received ray tracing input data, the circuitry including first circuitry to receive input data associated with an input block for a neural network, second circuitry to perform operations associated with a feature extraction and kernel prediction network of the neural network, and third circuitry to perform operations associated with a filtering block of the neural network.Type: ApplicationFiled: September 30, 2022Publication date: May 11, 2023Applicant: Intel CorporationInventors: Manu Mathew Thomas, Karthik Vaidyanathan, Anton Kaplanyan, SungYe Kim, Gabor Liktor
-
Publication number: 20230144234Abstract: A base station may receive uplink data identifying uplink performance indicators associated with user equipment connected to the base station, and may receive tuning factors associated with shared channel traffic received by the user equipment and quality of service requirements of the user equipment. The base station may determine a total score associated with utilizing a long duration physical uplink control channel (PUCCH) format for uplink control information based on the uplink data and the tuning factors. The base station may determine that the total score satisfies a threshold score and may switch to the long duration PUCCH format for the uplink control information based on the total score satisfying the threshold score. The base station may perform one or more actions based on switching to the long duration PUCCH format for the uplink control information.Type: ApplicationFiled: January 4, 2023Publication date: May 11, 2023Applicant: Verizon Patent and Licensing Inc.Inventors: Mathew THOMAS, Sachin VARGANTWAR, Maulik SHAH
-
Publication number: 20230078556Abstract: New Radio (NR)-aware LTE scheduling is provided. An access station for a radio access network includes a first scheduling function. The first scheduling function identifies a User Equipment (UE) device that has a first active wireless connection and a second active wireless connection to the radio access network. The first scheduling function determines that expanded coverage is need for an uplink transmission for the second active wireless connection and obtains uplink scheduling information for the second active wireless connection. The first scheduling function adjusts uplink scheduling for the first active wireless connection such that power sharing is prioritized for uplink time intervals of the second active wireless connection over overlapping uplink time intervals of the first active wireless connection.Type: ApplicationFiled: September 15, 2021Publication date: March 16, 2023Inventors: Alpaslan Gence Savas, Mathew Thomas, Sachin Vargantwar, Chin Chiu, Maulik Shah
-
Publication number: 20230066626Abstract: One embodiment provides a graphics processor comprising a set of processing resources configured to perform a supersampling operation via a mixed precision convolutional neural network, the set of processing resources including circuitry configured to receive, at an input block of a neural network model, history data, velocity data, and current frame data, pre-process the history data, velocity data, and current frame data to generate pre-processed data, provide the pre-processed data to a feature extraction network of the neural network model, process the pre-processed data at the feature extraction network via one or more encoder stages and one or more decoder stages, and generate an output image via an output block of the neural network model via direct reconstruction or kernel prediction.Type: ApplicationFiled: November 1, 2021Publication date: March 2, 2023Applicant: Intel CorporationInventors: SungYe Kim, Karthik Vaidyanathan, Gabor Liktor, Manu Mathew Thomas
-
Patent number: 11586741Abstract: A computer security system includes a test management system and associated communication architecture that enables creation of customized tests of computer security application features. A server stores a test script in a custom scripting language. The test script includes a set of control statements that may be organized in a decision tree to control facilitation of the test. Clients poll the server to independently obtain and execute the control statements. Execution of the control statements control which clients participate in a test, which feature will be tested in the test, and what telemetry data will be collected from the clients to evaluate the test. The server evaluates the telemetry data to determine an outcome of the test and determines whether to further distribute or roll back the tested feature based on the test outcome. The testing can be utilized to rapidly and robustly deploy features that will enhance computer security.Type: GrantFiled: August 24, 2021Date of Patent: February 21, 2023Assignee: Malwarebytes Inc.Inventors: Sunil Mathew Thomas, Jonathan Chan, Jonathan Eagan Rackley
-
Patent number: 11576182Abstract: A base station may receive uplink data identifying uplink performance indicators associated with user equipment connected to the base station, and may receive tuning factors associated with shared channel traffic received by the user equipment and quality of service requirements of the user equipment. The base station may determine a total score associated with utilizing a long duration physical uplink control channel (PUCCH) format for uplink control information based on the uplink data and the tuning factors. The base station may determine that the total score satisfies a threshold score and may switch to the long duration PUCCH format for the uplink control information based on the total score satisfying the threshold score. The base station may perform one or more actions based on switching to the long duration PUCCH format for the uplink control information.Type: GrantFiled: February 24, 2021Date of Patent: February 7, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: Mathew Thomas, Sachin Vargantwar, Maulik Shah
-
Patent number: 11520887Abstract: Client devices detect malware based on a ruleset received from a security server. To evaluate a current ruleset, an administrative client device initiates a ruleset evaluation of the malware detection ruleset. A security server partitions stored malware samples into a group of evaluation lists based on an evaluation policy. The security server then creates scanning nodes on an evaluation server according to the evaluation policy. The scanning nodes scan the malware samples of the evaluation lists using the rulesets and associate each malware sample with a rule of the ruleset based on the detections, if any. The security server analyzes the associations and optimizes the ruleset and stored malware samples. The security server sends the optimized ruleset to client devices such that they more efficiently detect malware samples.Type: GrantFiled: October 14, 2020Date of Patent: December 6, 2022Assignee: Malwarebytes Inc.Inventors: Sunil Mathew Thomas, Michael Graham Malone
-
Publication number: 20220374215Abstract: A computer implemented method determines a placement of an application being added to a network. The method includes determining a logical-physical mapping for the application. Sub-graphs in the logical-physical mapping are identified. A stored application in a catalog of applications previously used in the network is located. The stored application includes one of the sub-graphs in the logical-physical mapping. An experiment is generated, performed by a computing device running a neural network model, using the sub-graphs. The experiment includes inducing a physical node mapping for the sub-graph. A cost function associated with a placement of the application being added to the network to one or more physical nodes in the induced physical node mapping is determined.Type: ApplicationFiled: May 20, 2021Publication date: November 24, 2022Inventors: Mudhakar Srivatsa, Dinesh C. Verma, Satish Sadagopan, Mathews Thomas, Utpal Mangla
-
Publication number: 20220318397Abstract: A computer security system includes a test management system and associated communication architecture that enables creation of customized tests of computer security application features. A server stores a test script in a custom scripting language. The test script includes a set of control statements that may be organized in a decision tree to control facilitation of the test. Clients poll the server to independently obtain and execute the control statements. Execution of the control statements control which clients participate in a test, which feature will be tested in the test, and what telemetry data will be collected from the clients to evaluate the test. The server evaluates the telemetry data to determine an outcome of the test and determines whether to further distribute or roll back the tested feature based on the test outcome. The testing can be utilized to rapidly and robustly deploy features that will enhance computer security.Type: ApplicationFiled: August 24, 2021Publication date: October 6, 2022Inventors: Sunil Mathew Thomas, Jonathan Chan, Jonathan Eagan Rackley
-
Publication number: 20220272707Abstract: A base station may receive uplink data identifying uplink performance indicators associated with user equipment connected to the base station, and may receive tuning factors associated with shared channel traffic received by the user equipment and quality of service requirements of the user equipment. The base station may determine a total score associated with utilizing a long duration physical uplink control channel (PUCCH) format for uplink control information based on the uplink data and the tuning factors. The base station may determine that the total score satisfies a threshold score and may switch to the long duration PUCCH format for the uplink control information based on the total score satisfying the threshold score. The base station may perform one or more actions based on switching to the long duration PUCCH format for the uplink control information.Type: ApplicationFiled: February 24, 2021Publication date: August 25, 2022Applicant: Verizon Patent and Licensing Inc.Inventors: Mathew THOMAS, Sachin VARGANTWAR, Maulik SHAH
-
Publication number: 20220271992Abstract: A computer-implemented method and a computer system establish network slices within a physical network having a plurality of network elements. The method includes receiving a request to instantiate a network slice at a network element. The method also includes determining a performance metric of the network element. The method further includes delaying instantiation of the requested network slice within the network element in response to determining that the performance metric of the network element is below a threshold. The method also includes instantiating the requested network slice within the network element in response to determining that the performance metric of the network element is at or above the threshold. Finally, the method includes deactivating the requested network slice in response to determining that the performance metric of the network element is below the threshold at a time subsequent to instantiating the requested network slice.Type: ApplicationFiled: February 24, 2021Publication date: August 25, 2022Inventors: Dinesh C. Verma, MUDHAKAR SRIVATSA, Utpal Mangla, Mathews Thomas, SATISH SADAGOPAN
-
Publication number: 20220264480Abstract: A method, a device, and a non-transitory storage medium are described in which an component carrier management service is provided. The service may monitor data pertaining to a transmit power of an end device and a component carrier of a carrier aggregation. Based on the monitoring, the service may determine when the end device is at or near a maximum transmit power. The service may perform a mitigation procedure to prevent or minimize the end device shutting off a component carrier in a radio transmitter chain.Type: ApplicationFiled: February 17, 2021Publication date: August 18, 2022Inventors: Mathew Thomas, Sachin Vargantwar, Maulik Shah, Nischal Patel, Nicholas James Cordaro
-
Patent number: 11405969Abstract: A network traffic associated with a communication request within a computing device can be identified. The device can comprise of a first and second communication stack which can addresses a first and a second network interface within the computing device. The first network interface can be associated with a mobile broadband network and the second network interface can be associated with a computing network. A first and second portion of the network traffic associated with the communication request can be programmatically determined to be conveyed to the first and second network interfaces. The first and second portions of network traffic can be conveyed simultaneously to the mobile broadband network associated with the first network interface and the computing network associated with the second network interface.Type: GrantFiled: September 29, 2010Date of Patent: August 2, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Subil M. Abraham, Vinod A. Bijlani, Mathews Thomas
-
Publication number: 20220239670Abstract: A malware infection prediction method predicts a likelihood that a client device is to be infected with in a period of time based on state and behavior telemetry data. A malware infection prediction system receives telemetry data associated with use (i.e. behavior data) and configuration (i.e. state data) of a client device. By using a trained model, the system predicts a likelihood of the client device becoming infected within a given time frame. Based on the predicted likelihood, the system generates recommendations including recommended actions for reducing the likelihood of the client device becoming infected. The system then generates notifications including the recommendations and sends the notifications to the client device or to an administrative account associated with the client device.Type: ApplicationFiled: July 7, 2021Publication date: July 28, 2022Inventors: Sunil Mathew Thomas, Tina LaVonne Barfield, Adam Hyder
-
Publication number: 20220081440Abstract: This invention relates to compounds of the general formula: in which the variable groups are as defined herein, and to their preparation and use.Type: ApplicationFiled: October 12, 2021Publication date: March 17, 2022Inventors: Dong Zou, Wei-Sheng Huang, R. Mathew Thomas, Jan Antoinette C. Romero, Jiwei Qi, Yihan Wang, Xiaotian Zhu, William C. Shakespeare, Rajeswari Sundaramoorthi, Chester A. Metcalf, III, David C. Dalgarno, Tomi K. Sawyer
-
Patent number: 11227314Abstract: An approach for creating dynamic content. The approach receives advertiser data associated with activities of one or more advertisers and receives publisher data associated with activities of one or more publishers. The approach manages the one or more DSPs activities associated with the received advertiser data and publisher data. Furthermore, the approach manages the one or more SSPs activities associated with the received advertiser data, publisher data and the one or more DSPs activities and selects one or more advertisement for one or more website. Finally, the approach manages the one or more consumer behaviors associated with the selected one or more advertisement.Type: GrantFiled: September 11, 2019Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Mathews Thomas, Janki Vora, Utpal Mangla, Amandeep Singh, Venkatesh Ashok Rao Rao, Sharath Prasad Krishna Prasad
-
Patent number: 11189301Abstract: Utterances spoken or sung by a first person can be received, in real time. The detected utterances can be compared to at least a stored sample of utterances spoken or sung by the first person. Based on the comparing, audio of the utterances spoken or sung by the first person can be isolated from a background noise. A volume of the utterances spoken or sung by a first person relative to the background noise can be determined. A key indicator that indicates the volume of the detected utterances spoken or sung by the first person relative to the background noise can be generated. Based on the key indicator, information indicating the volume of the detected utterances spoken or sung by the first person relative to the background noise can be communicated.Type: GrantFiled: July 16, 2019Date of Patent: November 30, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alan D. Emery, Aditya Sood, Mathews Thomas, Janki Y. Vora