DETECTION OF SIDE CHANNEL ATTACKS BETWEEN VIRTUAL MACHINES
    633.
    发明申请
    DETECTION OF SIDE CHANNEL ATTACKS BETWEEN VIRTUAL MACHINES 有权
    检测虚拟机之间的通道攻击

    公开(公告)号:US20160044059A1

    公开(公告)日:2016-02-11

    申请号:US14384677

    申请日:2013-12-04

    Inventor: Kevin S. Fine

    CPC classification number: H04L63/1466 G06F21/556 H04L63/1416 H04L63/1425

    Abstract: Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt (IPI) rate of a first virtual machine (VM), a time stamp counter (TSC) rate of a second VM, and a cache miss ratio (CMR) of a third VM may be monitored. A side channel attack may then be detected based on the IPI rate, the TSC rate, and the CMR.

    Abstract translation: 技术涉及检测器以识别虚拟机之间的侧向信道攻击。 根据一些示例,第一虚拟机(VM)的处理器间中断(IPI)速率,第二VM的时间戳计数器(TSC)速率和第三VM的高速缓存未命中率(CMR)可以是 监控。 然后可以基于IPI速率,TSC速率和CMR来检测侧信道攻击。

    VIRTUAL INSTRUMENT PLAYING SCHEME
    634.
    发明申请

    公开(公告)号:US20160042729A1

    公开(公告)日:2016-02-11

    申请号:US14922671

    申请日:2015-10-26

    Abstract: Technologies are generally described for a virtual instrument playing system. In some examples, a virtual instrument playing system may include a sensor data receiving unit configured to receive first sensor data of a first user and second sensor data of the first user, a sound event prediction unit configured to detect a sound event of the first user and to predict a sound generation timing corresponding to the sound event of the first user based at least in part on the first sensor data of the first user, an instrument identification unit configured to identify a virtual instrument corresponding to the sound event from one or more virtual instruments based at least in part on the second sensor data of the first user, a sound data generation unit configured to generate sound data of the first user regarding the identified virtual instrument based at least in part on the sound generation timing, and a video data generation unit configured to generate video data of the first user regarding the identified virtual instrument based at least in part on the second sensor data of the first user.

    COMPOSITE TASK PROCESSOR
    635.
    发明申请
    COMPOSITE TASK PROCESSOR 有权
    复合任务处理器

    公开(公告)号:US20160041847A1

    公开(公告)日:2016-02-11

    申请号:US14647701

    申请日:2014-05-05

    Inventor: Jun Fang

    CPC classification number: G06F9/5038 G06F9/52

    Abstract: Technologies are generally described for systems, devices and methods effective to process a composite task to be applied to an ontology. In some examples, the methods may include a processor receiving a composite task. The methods may include the processor transforming the composite task into a set of atomic tasks. The set of atomic tasks may include at least a first atomic task, a second atomic task, and a third atomic task. The methods may include the processor determining that the first atomic task is equivalent to the second atomic task based on the ontology. The methods may include the processor removing the second atomic task from the set of atomic tasks to generate a list of atomic tasks. The methods may include the processor applying the list of atomic tasks to the ontology.

    Abstract translation: 技术通常描述用于有效处理应用于本体的复合任务的系统,设备和方法。 在一些示例中,该方法可以包括接收复合任务的处理器。 该方法可以包括处理器将复合任务转换为一组原子任务。 原子任务集可以包括至少第一原子任务,第二原子任务和第三原子任务。 该方法可以包括处理器基于本体确定第一原子任务等同于第二原子任务。 该方法可以包括处理器从原子任务集中移除第二原子任务以生成原子任务列表。 这些方法可以包括处理器将原子任务列表应用于本体。

    Determining A Write Operation
    637.
    发明申请
    Determining A Write Operation 有权
    确定写操作

    公开(公告)号:US20160041599A1

    公开(公告)日:2016-02-11

    申请号:US14454121

    申请日:2014-08-07

    Abstract: Technologies are generally described herein for writing data to either volatile or nonvolatile memory. An estimated time for a last write operation to occur and an estimated time to a power down event are determined. A threshold time is generated from the estimated time for a last write operation to occur and the estimated time to a power down event. The threshold time represents time at which a cost to write to volatile memory may become greater than a cost to write to nonvolatile memory. The cost may be based at least in part on the need to copy data stored in a volatile memory to be persisted after a power down event from the volatile to the nonvolatile memory.

    Abstract translation: 这里通常描述技术来将数据写入易失性或非易失性存储器。 确定最后一次写入操作的估计时间以及断电事件的估计时间。 从最后写入操作发生的估计时间和断电事件的估计时间产生阈值时间。 阈值时间表示写入易失性存储器的成本可能变得大于写入非易失性存储器的成本的时间。 成本可以至少部分地基于在从易失性存储器到非易失性存储器的掉电事件之后复制存储在易失性存储器中的数据以被持续的需要。

    Decentralized cloud workflows
    640.
    发明授权
    Decentralized cloud workflows 有权
    分散云工作流程

    公开(公告)号:US09258355B2

    公开(公告)日:2016-02-09

    申请号:US13822201

    申请日:2012-11-12

    Abstract: Technologies related to decentralized cloud workflows are generally described. In some examples, client applications may generate workflow packages. The workflow packages may be used to access multiple network services, such that client applications need not communicate with intermediate network services in a network service workflow. A client application may send a workflow package to a first network service in the network service workflow. The first network service may process instructions in the workflow package, store transaction results, and forward the workflow package to a next network service. Each intermediate network service may similarly process instructions, store transaction results, and forward the workflow package. Ultimately a last network service in the network service workflow may send workflow completion information to the client application.

    Abstract translation: 一般来说,涉及分散云工作流程的技术。 在一些示例中,客户端应用程序可能会生成工作流程包。 可以使用工作流程包来访问多个网络服务,使得客户端应用程序不需要在网络服务工作流程中与中间网络服务进行通信。 客户端应用程序可以将工作流程包发送到网络服务工作流中的第一个网络服务。 第一网络服务可以处理工作流程包中的指令,存储事务结果,并将工作流程包转发到下一个网络服务。 每个中间网络服务可以类似地处理指令,存储事务结果以及转发工作流程包。 最终网络服务工作流中的最后一个网络服务可以向客户端应用程序发送工作流完成信息。

Patent Agency Ranking