Search Results - Computers

11 Results Sort By:
Real Time Hand Tracking and Pointing for Human Interaction
Real-Time Hand Pointing Estimationfor Human-Computer InteractionHand gesture is an efficient means for humans interacting with computers.Pointing gesture can resolve ambiguities derived from the verbal communication,thus opening up the possibility of humans interacting or communicatingintuitively with computers or robots by indicating objects or po...
Published: 7/15/2016   |   Inventor(s): Lijun Yin, Shaun Canavan, Kaoning Hu
Keywords(s):  
Category(s): Computers
Real Time Eye Tracking for Human Computer Interaction
Real-time Eye-tracking for Human-Computer InteractionThe ideal human-computer interaction system should function robustly with asfew constraints as those found in human-to-human interaction. One of the mosteffective means of interaction is through the behavior of the eye. Specifically,knowledge of the viewing direction and thus the area of regard o...
Published: 7/15/2016   |   Inventor(s): Lijun Yin, Michael Reale
Keywords(s):  
Category(s): Computers
An Extension of RDP Code with Optimal Decoding Procedure
Extended Row Diagonal Parity (EDP): RAID-6 Technology with Optimal Decoding Description: In modern data storage systems, Redundant Array of Independent Disks (RAID) techniques are preferred for achieving high performance and reliability. RAID systems protect data against disk failures by constructing an array of hard disks with redundant infor...
Published: 7/15/2016   |   Inventor(s): Yu Chen, Jun Feng
Keywords(s):  
Category(s): Computers, Wireless Technologies
EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation
Extension of the Even-Odd (EEO): RAID-6 Code for Parallel Implementation Description: Data storage technology has been recognized as one of the main dimensions of modern information technology. Traditionally, Redundant Array of Independent Disks (RAID) systems provide fault tolerance and capacity for recovery by making use of data redundancy. ...
Published: 7/15/2016   |   Inventor(s): Yu Chen, Jun Feng
Keywords(s):  
Category(s): Computers, Wireless Technologies
ODD: Protecting Sensitive Data in Mobile Devices by Out-of-order Data Division
TRIPLE-LAYER DISTRIBUTED DATA STORAGE SECURITYINVENTOR:Yu ChenDESCRIPTIONTechnologists are looking to achieve a balance between making data difficult to be illegally or maliciously compromised while providing legitimate data users and owners sufficient encryption protection that does not overly strain the computing power, storage space, processing ...
Published: 7/15/2016   |   Inventor(s): Yu Chen
Keywords(s):  
Category(s): Computers, Wireless Technologies
Displacement Sensor
This invention involved a sensor to detect the displacements of the substrate to which the proof mass is attached and is carefully designed to detect the montions. We have performed extensive preliminary work to validate the design. This includes simplified analyses of the response of only the first mode of vibration; we considered only one deg...
Published: 7/15/2016   |   Inventor(s): Ronald Miles, Weili Cui, Quang Su, Vladimir Bogachuk
Keywords(s):  
Category(s): Computers, Wireless Technologies
Hardware Mechanism for Authenticating Program Execution at Run-time in a Microprocessor
Hardware Mechanism for Authenticating Program Execution at Run-time in a Microprocessor A mechanism for validating the legal execution path and instructions along the legal execution path that works in parallel with normal program execution and imposes a very small performance penalty is disclosed. The reference information for the validation ...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
System and Method for Validating Program Execution at Run-Time Using Control Flow SignaturesDescription:A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host platform and its software environment are poten...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
System and Method for Validating Program Execution at Run-Time
System and Method for Validating Program Execution at Run-TimeDescription:Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues to worsen; novel attacks appear with high frequency and employ...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
Authentication of Remotely Executed Program
System and Method for Authenticating Remote ExecutionDescription:As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to become truly pervasive, mechanisms are needed to not only authenticate the remote serves but also to authentic...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s):  
Category(s): Computers, Wireless Technologies
1 2 
© 2018. All Rights Reserved. Powered by Inteum