Search Results
288 Results for 'Information Technology'
PAGE 10 OF 12
Technology
Efficient Video Retargeting Approach That Avoids Jitter
Image and video resizing involves adapting an image or video to displays with different sizes and aspect ratios, often resulting in warping or distortion. Video retargeting addresses the problem of ad...
Learn More
Learn More
Michael Gleicher, Feng Liu, Yuzhen Niu | P100231US01
Technology
Computer Architecture Enables Simplified Recovery from Speculative Execution Errors without Checkpoints
The effective speed of computer processors may be increased by speculative execution in which computer instructions are executed before the data necessary for that execution are available. Speculation...
Learn More
Learn More
Karthikeyan Sankaralingam, Marc De Kruijf, Chen-Han Ho | P110133US01
Technology
Method for Reducing Power Consumption of Mobile Devices
Mobile devices such as cell phones are used increasingly to connect to computer networks such as the Internet for Web browsing, email communication, voice-over-IP (VoIP) telephone and other Internet s...
Learn More
Learn More
Suman Banerjee, Arunesh Mishra | P08297US
Technology
Operating System Support for Restartable File Systems
Operating systems, such as Microsoft Windows or Linux, provide one or more file systems to store and organize data. A file system stores file data on a storage device and makes the data available to t...
Learn More
Learn More
Michael Swift, Andrea Arpaci-Dusseau, Remzi Arpaci-Dusseau, Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale | P110059US01
Technology
Universal Signal-to-Noise Ratio Enhancement Using PICCS Image Reconstruction
Signal-to-noise ratio (SNR) is utilized in medical imaging as a quantitative measure of image quality. As SNR decreases, it becomes increasingly more difficult to differentiate between important anato...
Learn More
Learn More
Guang-Hong Chen, Jie Tang | P100275US01
Technology
Algorithm Improves Resolution of Time-Frequency Analysis for Medical Diagnostics, Telecommunications
Time-frequency analysis involves detecting when oscillations of certain frequencies turn on and off. This kind of analysis is useful in nearly every field of science and engineering. The traditional a...
Learn More
Learn More
David Hsu, Murielle Hsu, Gregory Worrell | P100227US01
Technology
Optimizing Clock Speed and Power Dissipation in Multicore Processors
Multicore processors incorporate independent cores onto an integrated circuit, which allows for faster processing by distributing portions of the parallel processing task among the different cores. Th...
Learn More
Learn More
Nam Sung Kim | P100298US01
Technology
Ultrawide Band, Compact Antenna for Low Frequency Applications, Including Military Vehicles and Wireless Communications
In applications such as military vehicles, ultrawide band antennas are needed to operate at very low frequencies. At such frequencies, the electromagnetic wavelength is very large. Consequently, any a...
Learn More
Learn More
Nader Behdad, Mudar Al-Joumayly, Mohsen Salehi | P100168US01
Technology
Method for Assessing 3-D Crystal Structures from in Situ Digital Images
Suspension crystallization processes often result in crystals with a wide range of particle sizes. Accurately controlling the distribution of shapes and sizes is a challenge in the pharmaceutica...
Learn More
Learn More
James Rawlings, Nicola Ferrier, Paul Larsen | P06449US
Technology
Design of Keyboard for Improved Accessibility to Electronics
Modern public information and transaction machines such as kiosks and automated teller machines (ATMs) frequently employ a touch screen in conjunction with a computer to provide multimedia capabilitie...
Learn More
Learn More
Gregg Vanderheiden, David Kelso, J. Bern Jordan | P08092US03
Technology
Night Vision System, Device and Method for Enhanced Signal-to-Noise Ratio
Night vision systems utilize cameras that are sensitive to wavelengths such as infrared (IR) to produce image frames. The IR image frames may be displayed alone in sequence to provide a moving picture...
Learn More
Learn More
Charles Mistretta, Justin Mertes-Mistretta, Erick Oberstar, Ethan Brodsky | P09027US
Technology
Protomatching Network Traffic for High Throughput Network Intrusion Detection
Network intrusion detection systems (NIDS) use signature-based detection of malicious software, or malware, to identify suspicious patterns in network traffic. Malware can be disguised by changing dat...
Learn More
Learn More
Somesh Jha, Barton Miller, Shai Rubin | P06192US
Technology
Channel Aware Space-Time Signaling for Wireless Communication over Wideband Multipath Channels
Wireless communication has grown significantly over the past several years. To support multiple private two-way communications, the available spectrum is divided into a number of sub-channels that are...
Learn More
Learn More
Barry Van Veen, Akbar Sayeed, Eko Onggosanusi | P01040US
Technology
Tailored Radiopharmaceutical Dosimetry for 4-D Treatment Planning System
Radiopharmaceuticals are radioactive materials that “target” specific tissues to allow imaging or treatment. During radiation therapy, the radiopharmaceutical must be administered to provi...
Learn More
Learn More
Wolfgang Tome, Joseph Grudzinski, Jamey Weichert, Robert Jeraj | P09003US
Technology
Signature-Based Transactional Memory for Improved Performance of Multiple Thread Microprocessors
Multicore processor technology allows a program to utilize resources efficiently by splitting into concurrently running tasks, or threads. Problems exist when these tasks access the same data. If one ...
Learn More
Learn More
Michael Swift, David Wood, Mark Hill, Michael Marty, Luke Yen, Kevin Moore, Jayaram Bobba, Haris Volos | P07519US
Technology
Improved Method and Apparatus for Wire-Speed Packet Classification on IP Networks
Packet classification is a critical factor affecting the quality of service and security on Internet protocol and other packet-based networks. Packet classification involves matching incoming in...
Learn More
Learn More
Suman Banerjee, Jia Wang, Qunfeng Dong | P09053US
Technology
Computer Architecture Providing Transactional, Lock-Free Execution of Lock-Based Programs
Multi-threaded software provides multiple execution “threads” that act like independent (but cooperating) programs and can be assigned to different computer processors for parallel, and th...
Learn More
Learn More
Ravi Rajwar, James Goodman | P03229US
Technology
Input Feature and Kernel Selection Improves Speed, Accuracy and Efficiency of Support Vector Machine Classification
Support vector machines (SVMs) are powerful tools for classifying data that are often used in data mining operations. An SVM classifies data in extremely large data sets by identifying a linear or non...
Learn More
Learn More
Olvi Mangasarian, Glenn Fung | P03201US
Technology
A Novel Method for Detecting Computer Viruses
In the interconnected world of computers, malicious programs such as viruses have become an omnipresent and dangerous threat.
Learn More
Learn More
Somesh Jha, Mihai Christodorescu | P03146US
Technology
Identifying Computer Program Phase Changes through Program Working Set Analysis
As computer programs execute, they pass through different phases of operation that require more or less hardware resources. If the available hardware resources are insufficient for the needs of a part...
Learn More
Learn More
James Smith, Ashutosh Dhodapkar | P03019US
Technology
High-Power-Gain, Bipolar Transistor Amplifier
Silicon is a relatively inexpensive material for making integrated power amplifiers for communications devices such as cell phones; however, these power amplifiers are generally limited to low power a...
Learn More
Learn More
Zhenqiang Ma, Ningyue Jiang | P05260US
Technology
Semantically-Aware Network Intrusion Signature Generator
Network intrusion detection systems (NIDS) can help protect computer networks from worms, viruses and other malicious software. Today’s NIDS rely on a set of simple signatures to identify malici...
Learn More
Learn More
Paul Barford, Somesh Jha, Vinod Yegneswaran, Jonathon Giffin | P05038US
Technology
Processing Unit Having a Decimal Floating-Point Divider Using Newton-Raphson Iteration
Most decimal dividers are for fixed-point (typically integer) decimal data. They cannot be directly applied to floating-point decimal dividers; require time-consuming and error-prone scaling when work...
Learn More
Learn More
Michael Schulte, Liang-Kai Wang | P04398US
Technology
Processing Unit Having Multioperand Decimal Addition
Most decimal adders add only two numbers at a time. Adding several numbers together takes a long time, because each addition requires carries to propagate.
Learn More
Learn More
Michael Schulte, Robert Kenney | P04399US
Technology
Spin Readout and Initialization in Semiconductor Quantum Dots
Quantum computers use quantum particles (e.g., electrons), called qubits, to process information, instead of bits as in classical, serial computing. Unlike bits, which exist in either the 0 or 1 state...
Learn More
Learn More
Mark Friesen, Mark Eriksson, Charles Tahan, Robert Joynt | P04175US