HOME
SEARCH
RSS FEED
SUBSCRIBE
Search Results - kanad+ghose
8
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
System and Method for Reducing Power and Energy Requirements fo Microprocessors through Dynamic Allocation of Datapath Resources
System and method for reducing the power dissipation and energy requirements of high-performance microprocessors through the incremental allocation and deallocation of units of datapath resources Background: Modern, high-performance microprocessors use sophisticated instruction scheduling mechanisms and pipelines designed to reorder the startup...
Published: 5/13/2021
|
Inventor(s):
Kanad Ghose
,
Gurhan Kucuk
,
Dmitry Ponomarev
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Control Systems and Prediction Methods for IT Cooling Performance in Containment
Control systems and prediction methods for it cooling performance in containment systems by effectively controlling airflow Background: Containment is becoming a standard modality in data centers today due to its inherent energy efficiency advantages. Cold aisle containment, hot aisle containment, chimney, enclosed racks and rear door heat exchangers...
Published: 7/21/2024
|
Inventor(s):
Husam Alissa
,
Kourosh Nemati
,
Bahgat Sammakia
,
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Energy-Aware Load Direction in Server Installations
Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their peak efficiency levels. Technology Overview: Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their...
Published: 4/11/2024
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Server Power Management Through Dynamic Job Classification
This tool schedules new jobs and repetitive jobs with the server characteristics using the most energy-efficient configuration for realizing the performance goal Technology Overview: With the growing concern about energy expenditures in server installations, mechanisms are needed for improving the energy-efficiency of server installations....
Published: 4/11/2024
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor
A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty Background: The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 12/29/2023
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes. Background: A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 4/10/2023
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time
A technology that enables the detection of tampering of a program as the program executes for security applications. Background: Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 7/22/2024
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
Authentication of Remotely Executed Program
A mechanism for authenticating remote executions on a server in a distributed environment, validating what is executed at the server on behalf of the client Background: As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to...
Published: 7/27/2023
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
Home
|
Search
|
RSS
|
Subscribe
© 2024. All Rights Reserved. Powered by
Inteum