Patents by Inventor Raymond Mak
Raymond Mak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240192202Abstract: Methods of minimizing detection of unintended signals during array-based processes are provided. Methods include the use of sets of fluidic media that inhibit sources of unintended signals during array-based processes. Also provided are systems containing the sets of fluidic media that are configured to perform the array-based processes provided herein.Type: ApplicationFiled: December 7, 2023Publication date: June 13, 2024Inventors: Rukshan PERERA, Maryam JOUZI, Cassandra STAWICKI, Torri Elise RINKER, Chol YUN, Kenneth KUHN, Raymond MAK
-
Patent number: 11847434Abstract: One or more computer processors receive a pattern string comprising a pointer to a pattern search point and a string comprising a pointer to a search point; determine a plausible search point within the string for the pattern character; execute a search string (SRST) instruction with the determined search point and the pattern character; compute a pattern offset comprising a difference between a first occurrence of the determined pattern character located within the pattern string but not in the correct position and a current pattern character position; execute a subsequent SRST instruction with the current pattern character position and the computed offset set as a new search point; and responsive to identifying all pattern characters in the correct position within the string based on the executed subsequent SRST instruction, transmit memory address associated with a substring comprised of the string and corresponding pattern characters in the correct position.Type: GrantFiled: June 24, 2021Date of Patent: December 19, 2023Assignee: International Business Machines CorporationInventors: Allan H. Kielstra, Ying Chau Raymond Mak, Ka Yin Lam, John Michael Chase
-
Publication number: 20230090454Abstract: Methods and systems for identifying and/or quantifying polypeptide binding interactions of ligand-binding polypeptides are disclosed. Detailed methods include methods for identifying binding ligands of ligand-binding polypeptides and methods for assessing changes in binding behavior due to alterations of ligand-binding polypeptides. Detailed systems include array-based systems that permit detection of ligand binding interactions at single-analyte resolution.Type: ApplicationFiled: September 19, 2022Publication date: March 23, 2023Inventors: Gregory KAPP, James Henry JOLY, James SHERMAN, Torri Elise RINKER, Raymond MAK
-
Publication number: 20220413817Abstract: One or more computer processors receive a pattern string comprising a pointer to a pattern search point and a string comprising a pointer to a search point; determine a plausible search point within the string for the pattern character; execute a search string (SRST) instruction with the determined search point and the pattern character; compute a pattern offset comprising a difference between a first occurrence of the determined pattern character located within the pattern string but not in the correct position and a current pattern character position; execute a subsequent SRST instruction with the current pattern character position and the computed offset set as a new search point; and responsive to identifying all pattern characters in the correct position within the string based on the executed subsequent SRST instruction, transmit memory address associated with a substring comprised of the string and corresponding pattern characters in the correct position.Type: ApplicationFiled: June 24, 2021Publication date: December 29, 2022Inventors: ALLAN H. KIELSTRA, Ying Chau Raymond Mak, Ka Yin Lam, John Michael Chase
-
Patent number: 10558509Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key run time events during execution of a program. Each key run time event has a corresponding key run time event data structure associated with the program, and logging includes storing records associated with the key run time events, wherein each record is based on the key run time event data structure associated with the key run time event. The method further includes analyzing the records to determine if a current pattern of key run time events associated with the program during execution matches an expected pattern of key run time events and generating a security alert if the current pattern of key run time events does not match the expected pattern of key run time events for the program.Type: GrantFiled: February 13, 2019Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Rachel E. Craik, Allan Kielstra, Ying Chau Raymond Mak, Melanie Ullmer
-
Publication number: 20190179686Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key run time events during execution of a program. Each key run time event has a corresponding key run time event data structure associated with the program, and logging includes storing records associated with the key run time events, wherein each record is based on the key run time event data structure associated with the key run time event. The method further includes analyzing the records to determine if a current pattern of key run time events associated with the program during execution matches an expected pattern of key run time events and generating a security alert if the current pattern of key run time events does not match the expected pattern of key run time events for the program.Type: ApplicationFiled: February 13, 2019Publication date: June 13, 2019Inventors: Rachel E. Craik, Allan Kielstra, Ying Chau Raymond Mak, Melanie Ullmer
-
Patent number: 10228988Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events during execution of a program. Each key event has a corresponding key event data structure associated with the program, and logging includes storing records associated with the key events, wherein each record is based on the key event data structure associated with the key event. The method further includes analyzing the records to determine if a current pattern of key events associated with the program during execution matches an expected pattern of key events and generating a security alert if the current pattern of key events does not match the expected pattern of key events for the program.Type: GrantFiled: November 4, 2015Date of Patent: March 12, 2019Assignee: International Business Machines CorporationInventors: Rachel E. Craik, Allan Kielstra, Raymond Mak, Melanie Ullmer
-
Publication number: 20170123875Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events during execution of a program. Each key event has a corresponding key event data structure associated with the program, and logging includes storing records associated with the key events, wherein each record is based on the key event data structure associated with the key event. The method further includes analyzing the records to determine if a current pattern of key events associated with the program during execution matches an expected pattern of key events and generating a security alert if the current pattern of key events does not match the expected pattern of key events for the program.Type: ApplicationFiled: November 4, 2015Publication date: May 4, 2017Inventors: Rachel E. Craik, Allan Kielstra, Raymond Mak, Melanie Ullmer
-
Patent number: 8245204Abstract: Managing program function parameters using compiler directives is provided. A parameter management system can include a compiler coupled to a primary symbol-type dictionary and a supplemental symbol-type dictionary containing parameter data for specific function calls of corresponding generic type functions. Notably, directive processing logic can be configured both to populate the supplemental symbol-type dictionary based upon processor directives embedded in source code, and also to substitute specific function calls for generic function calls in the source code as specified in the supplemental symbol-type dictionary.Type: GrantFiled: December 31, 2007Date of Patent: August 14, 2012Assignee: International Business Machines CorporationInventors: Ying Chau Raymond Mak, Wang Dong Chen, Larry Alexander Lindsay
-
Patent number: 7831798Abstract: A computer-implemented method including receiving a set of data having a mapping. The set of data has groups of subsets of data. The mapping describes in what order the groups of subsets of data are to be stored in a memory. The mapping also describes the offsets of the groups of subsets of data in the memory. The mapping is not changed when the set of data is stored in the memory. The method also includes determining a starting address for the set of data. The starting address corresponds to an address in the memory. The starting address is determined such that an optimum number of subsets of data in the groups of subsets of data are aligned. The method also includes storing the set of data in the memory, wherein the mapping is unaffected when the set of data is stored in the memory.Type: GrantFiled: September 18, 2007Date of Patent: November 9, 2010Assignee: International Business Machines CorporationInventors: Wang Dong Chen, Ying Chau Raymond Mak
-
Publication number: 20080162825Abstract: A method for optimizing distributed memory access using a protected page. The method includes generating library calls to perform array accesses. The method further includes generating a layout map or assisting the accesses. Each processor possesses a local copy of this map. The method proceeds by allocating arrays across the processors, such that each processor receives a local portion of the array. The method further proceeds by reserving the memory location immediately before the local address. Then, the method proceeds by placing the memory location address under access protection, such that a protected page is formed.Type: ApplicationFiled: January 2, 2007Publication date: July 3, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gheorghe C. Cascaval, Ying Chau Raymond Mak
-
Scalable runtime system for global address space languages on shared and distributed memory machines
Patent number: 7380086Abstract: An improved scalability runtime system for a global address space language running on a distributed or shared memory machine uses a directory of shared variables having a data structure for tracking shared variable information that is shared by a plurality of program threads. Allocation and de-allocation routines are used to allocate and de-allocate shared variable entries in the directory of shared variables. Different routines can be used to access different types of shared data. A control structure is used to control access to the shared data such that all threads can access the data at any time. Since all threads see the same objects, synchronization issues are eliminated. In addition, the improved efficiency of the data sharing allows the number of program threads to be vastly increased.Type: GrantFiled: December 12, 2003Date of Patent: May 27, 2008Assignee: International Business Machines CorporationInventors: Roch Archambault, Anthony Simon Bolmarcich, G. Calin Cascaval, Siddhartha Chatterjee, Maria Eleftheriou, Raymond Mak -
Patent number: 7367019Abstract: A method, system, architecture and apparatus for managing program function parameters using compiler directives. A parameter management system can include a compiler coupled to a primary symbol-type dictionary and a supplemental symbol-type dictionary containing parameter data for specific function calls of corresponding generic type functions. Notably, directive processing logic can be configured both to populate the supplemental symbol-type dictionary based upon processor directives embedded in source code, and also to substitute specific function calls for generic function calls in the source code as specified in the supplemental symbol-type dictionary.Type: GrantFiled: September 16, 2004Date of Patent: April 29, 2008Assignee: International Business Machines CorporationInventors: Ying Chau Raymond Mak, Wang Dong Chen, Larry Alexander Lindsay
-
Publication number: 20070026728Abstract: A new extension cord and its manufacturing method. The new extension cord has a plurality of sockets at intervals along its longitude direction so as to reduce the whole length of extension cord and increase the number of the sockets. The jacks of sockets are protected by caps to avoid occurrence of electricity shock and water entry into the sockets. The manufacturing method comprises steps of forming a plug, forming a plurality of sockets, forming electrical cords, disposed the sockets at intervals along a longitude direction of the electrical cord. The steps of forming each of the electrical cords comprise forming at least two electrical wires, forming an insulated wrap to enclose the conducting wires, welding the plug and the sockets to form an integral piece by ultrasonic wave.Type: ApplicationFiled: August 1, 2005Publication date: February 1, 2007Inventor: Raymond Mak
-
Scalable runtime system for global address space languages on shared and distributed memory machines
Publication number: 20050149903Abstract: An improved scalability runtime system for a global address space language running on a distributed or shared memory machine uses a directory of shared variables having a data structure for tracking shared variable information that is shared by a plurality of program threads. Allocation and de-allocation routines are used to allocate and de-allocate shared variable entries in the directory of shared variables. Different routines can be used to access different types of shared data. A control structure is used to control access to the shared data such that all threads can access the data at any time. Since all threads see the same objects, synchronization issues are eliminated. In addition, the improved efficiency of the data sharing allows the number of program threads to be vastly increased.Type: ApplicationFiled: December 12, 2003Publication date: July 7, 2005Inventors: Roch Archambault, Anthony Bolmarcich, G. Calin Cascaval, Siddhartha Chatterjee, Maria Eleftheriou, Raymond Mak