Patents by Inventor Raymond Mak

Raymond Mak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240192202
    Abstract: Methods of minimizing detection of unintended signals during array-based processes are provided. Methods include the use of sets of fluidic media that inhibit sources of unintended signals during array-based processes. Also provided are systems containing the sets of fluidic media that are configured to perform the array-based processes provided herein.
    Type: Application
    Filed: December 7, 2023
    Publication date: June 13, 2024
    Inventors: Rukshan PERERA, Maryam JOUZI, Cassandra STAWICKI, Torri Elise RINKER, Chol YUN, Kenneth KUHN, Raymond MAK
  • Patent number: 11847434
    Abstract: One or more computer processors receive a pattern string comprising a pointer to a pattern search point and a string comprising a pointer to a search point; determine a plausible search point within the string for the pattern character; execute a search string (SRST) instruction with the determined search point and the pattern character; compute a pattern offset comprising a difference between a first occurrence of the determined pattern character located within the pattern string but not in the correct position and a current pattern character position; execute a subsequent SRST instruction with the current pattern character position and the computed offset set as a new search point; and responsive to identifying all pattern characters in the correct position within the string based on the executed subsequent SRST instruction, transmit memory address associated with a substring comprised of the string and corresponding pattern characters in the correct position.
    Type: Grant
    Filed: June 24, 2021
    Date of Patent: December 19, 2023
    Assignee: International Business Machines Corporation
    Inventors: Allan H. Kielstra, Ying Chau Raymond Mak, Ka Yin Lam, John Michael Chase
  • Publication number: 20230090454
    Abstract: Methods and systems for identifying and/or quantifying polypeptide binding interactions of ligand-binding polypeptides are disclosed. Detailed methods include methods for identifying binding ligands of ligand-binding polypeptides and methods for assessing changes in binding behavior due to alterations of ligand-binding polypeptides. Detailed systems include array-based systems that permit detection of ligand binding interactions at single-analyte resolution.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 23, 2023
    Inventors: Gregory KAPP, James Henry JOLY, James SHERMAN, Torri Elise RINKER, Raymond MAK
  • Publication number: 20220413817
    Abstract: One or more computer processors receive a pattern string comprising a pointer to a pattern search point and a string comprising a pointer to a search point; determine a plausible search point within the string for the pattern character; execute a search string (SRST) instruction with the determined search point and the pattern character; compute a pattern offset comprising a difference between a first occurrence of the determined pattern character located within the pattern string but not in the correct position and a current pattern character position; execute a subsequent SRST instruction with the current pattern character position and the computed offset set as a new search point; and responsive to identifying all pattern characters in the correct position within the string based on the executed subsequent SRST instruction, transmit memory address associated with a substring comprised of the string and corresponding pattern characters in the correct position.
    Type: Application
    Filed: June 24, 2021
    Publication date: December 29, 2022
    Inventors: ALLAN H. KIELSTRA, Ying Chau Raymond Mak, Ka Yin Lam, John Michael Chase
  • Patent number: 10558509
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key run time events during execution of a program. Each key run time event has a corresponding key run time event data structure associated with the program, and logging includes storing records associated with the key run time events, wherein each record is based on the key run time event data structure associated with the key run time event. The method further includes analyzing the records to determine if a current pattern of key run time events associated with the program during execution matches an expected pattern of key run time events and generating a security alert if the current pattern of key run time events does not match the expected pattern of key run time events for the program.
    Type: Grant
    Filed: February 13, 2019
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rachel E. Craik, Allan Kielstra, Ying Chau Raymond Mak, Melanie Ullmer
  • Publication number: 20190179686
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key run time events during execution of a program. Each key run time event has a corresponding key run time event data structure associated with the program, and logging includes storing records associated with the key run time events, wherein each record is based on the key run time event data structure associated with the key run time event. The method further includes analyzing the records to determine if a current pattern of key run time events associated with the program during execution matches an expected pattern of key run time events and generating a security alert if the current pattern of key run time events does not match the expected pattern of key run time events for the program.
    Type: Application
    Filed: February 13, 2019
    Publication date: June 13, 2019
    Inventors: Rachel E. Craik, Allan Kielstra, Ying Chau Raymond Mak, Melanie Ullmer
  • Patent number: 10228988
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events during execution of a program. Each key event has a corresponding key event data structure associated with the program, and logging includes storing records associated with the key events, wherein each record is based on the key event data structure associated with the key event. The method further includes analyzing the records to determine if a current pattern of key events associated with the program during execution matches an expected pattern of key events and generating a security alert if the current pattern of key events does not match the expected pattern of key events for the program.
    Type: Grant
    Filed: November 4, 2015
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rachel E. Craik, Allan Kielstra, Raymond Mak, Melanie Ullmer
  • Publication number: 20170123875
    Abstract: Techniques are described for detecting anomalous behavior in program execution. In one example, a method includes logging occurrence of one or more key events during execution of a program. Each key event has a corresponding key event data structure associated with the program, and logging includes storing records associated with the key events, wherein each record is based on the key event data structure associated with the key event. The method further includes analyzing the records to determine if a current pattern of key events associated with the program during execution matches an expected pattern of key events and generating a security alert if the current pattern of key events does not match the expected pattern of key events for the program.
    Type: Application
    Filed: November 4, 2015
    Publication date: May 4, 2017
    Inventors: Rachel E. Craik, Allan Kielstra, Raymond Mak, Melanie Ullmer
  • Patent number: 8245204
    Abstract: Managing program function parameters using compiler directives is provided. A parameter management system can include a compiler coupled to a primary symbol-type dictionary and a supplemental symbol-type dictionary containing parameter data for specific function calls of corresponding generic type functions. Notably, directive processing logic can be configured both to populate the supplemental symbol-type dictionary based upon processor directives embedded in source code, and also to substitute specific function calls for generic function calls in the source code as specified in the supplemental symbol-type dictionary.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: August 14, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ying Chau Raymond Mak, Wang Dong Chen, Larry Alexander Lindsay
  • Patent number: 7831798
    Abstract: A computer-implemented method including receiving a set of data having a mapping. The set of data has groups of subsets of data. The mapping describes in what order the groups of subsets of data are to be stored in a memory. The mapping also describes the offsets of the groups of subsets of data in the memory. The mapping is not changed when the set of data is stored in the memory. The method also includes determining a starting address for the set of data. The starting address corresponds to an address in the memory. The starting address is determined such that an optimum number of subsets of data in the groups of subsets of data are aligned. The method also includes storing the set of data in the memory, wherein the mapping is unaffected when the set of data is stored in the memory.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: November 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Wang Dong Chen, Ying Chau Raymond Mak
  • Publication number: 20080162825
    Abstract: A method for optimizing distributed memory access using a protected page. The method includes generating library calls to perform array accesses. The method further includes generating a layout map or assisting the accesses. Each processor possesses a local copy of this map. The method proceeds by allocating arrays across the processors, such that each processor receives a local portion of the array. The method further proceeds by reserving the memory location immediately before the local address. Then, the method proceeds by placing the memory location address under access protection, such that a protected page is formed.
    Type: Application
    Filed: January 2, 2007
    Publication date: July 3, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gheorghe C. Cascaval, Ying Chau Raymond Mak
  • Patent number: 7380086
    Abstract: An improved scalability runtime system for a global address space language running on a distributed or shared memory machine uses a directory of shared variables having a data structure for tracking shared variable information that is shared by a plurality of program threads. Allocation and de-allocation routines are used to allocate and de-allocate shared variable entries in the directory of shared variables. Different routines can be used to access different types of shared data. A control structure is used to control access to the shared data such that all threads can access the data at any time. Since all threads see the same objects, synchronization issues are eliminated. In addition, the improved efficiency of the data sharing allows the number of program threads to be vastly increased.
    Type: Grant
    Filed: December 12, 2003
    Date of Patent: May 27, 2008
    Assignee: International Business Machines Corporation
    Inventors: Roch Archambault, Anthony Simon Bolmarcich, G. Calin Cascaval, Siddhartha Chatterjee, Maria Eleftheriou, Raymond Mak
  • Patent number: 7367019
    Abstract: A method, system, architecture and apparatus for managing program function parameters using compiler directives. A parameter management system can include a compiler coupled to a primary symbol-type dictionary and a supplemental symbol-type dictionary containing parameter data for specific function calls of corresponding generic type functions. Notably, directive processing logic can be configured both to populate the supplemental symbol-type dictionary based upon processor directives embedded in source code, and also to substitute specific function calls for generic function calls in the source code as specified in the supplemental symbol-type dictionary.
    Type: Grant
    Filed: September 16, 2004
    Date of Patent: April 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Ying Chau Raymond Mak, Wang Dong Chen, Larry Alexander Lindsay
  • Publication number: 20070026728
    Abstract: A new extension cord and its manufacturing method. The new extension cord has a plurality of sockets at intervals along its longitude direction so as to reduce the whole length of extension cord and increase the number of the sockets. The jacks of sockets are protected by caps to avoid occurrence of electricity shock and water entry into the sockets. The manufacturing method comprises steps of forming a plug, forming a plurality of sockets, forming electrical cords, disposed the sockets at intervals along a longitude direction of the electrical cord. The steps of forming each of the electrical cords comprise forming at least two electrical wires, forming an insulated wrap to enclose the conducting wires, welding the plug and the sockets to form an integral piece by ultrasonic wave.
    Type: Application
    Filed: August 1, 2005
    Publication date: February 1, 2007
    Inventor: Raymond Mak
  • Publication number: 20050149903
    Abstract: An improved scalability runtime system for a global address space language running on a distributed or shared memory machine uses a directory of shared variables having a data structure for tracking shared variable information that is shared by a plurality of program threads. Allocation and de-allocation routines are used to allocate and de-allocate shared variable entries in the directory of shared variables. Different routines can be used to access different types of shared data. A control structure is used to control access to the shared data such that all threads can access the data at any time. Since all threads see the same objects, synchronization issues are eliminated. In addition, the improved efficiency of the data sharing allows the number of program threads to be vastly increased.
    Type: Application
    Filed: December 12, 2003
    Publication date: July 7, 2005
    Inventors: Roch Archambault, Anthony Bolmarcich, G. Calin Cascaval, Siddhartha Chatterjee, Maria Eleftheriou, Raymond Mak