-
公开(公告)号:US20210152563A1
公开(公告)日:2021-05-20
申请号:US17131615
申请日:2020-12-22
申请人: Sunil Cheruvu , Ned M. Smith , Francesc Guim Bernat , Kshitij Arun Doshi , Eve M. Schooler , Dario Sabella
发明人: Sunil Cheruvu , Ned M. Smith , Francesc Guim Bernat , Kshitij Arun Doshi , Eve M. Schooler , Dario Sabella
IPC分类号: H04L29/06 , H04L12/721 , H04L29/08 , G06F8/60
摘要: A named function network (NFN) system includes a routing node, a function generation node, and a server node. The routing node receives requests for new functions, the requests including data values for generating the new functions. The function generation node receives the data values from the routing node and generates a new function for the NFN using the data values. The server node receives a request from the routing node to execute the new function, executes the new function, and transmits results of the execution to the routing node.
-
公开(公告)号:US20220222105A1
公开(公告)日:2022-07-14
申请号:US17711462
申请日:2022-04-01
申请人: Jeffrey Christopher Sedayao , Juan Pablo Munzo , Vinoth kumar Chandra Mohan , Promila Agarwal , Dean Chu , Eve M. Schooler , Kshitij Arun Doshi
发明人: Jeffrey Christopher Sedayao , Juan Pablo Munzo , Vinoth kumar Chandra Mohan , Promila Agarwal , Dean Chu , Eve M. Schooler , Kshitij Arun Doshi
摘要: System and techniques for container provisioning are described herein. A request to instantiate a container image may be made. This request specifies a name for the container image where the name is created through a first defined generation process applied to contents of the container image. A container manifest may be received from a local copy of a distributed container directory. The container manifest includes a set of entries for container layer images of the container image. Here, the set of entries are named by a second defined generation process applied to respective container layer images. Then, container layer images may be retrieved using names from the set of entries and the container image instantiated using the retrieved container layer images.
-
公开(公告)号:US20190325737A1
公开(公告)日:2019-10-24
申请号:US16456716
申请日:2019-06-28
申请人: Hassnaa Moustafa , Eve M. Schooler , Maruti Gupta Hyde , Jeffrey Christopher Sedayao , Ned M. Smith , S. M. Iftekharul Alam , Satish Chandra Jha
发明人: Hassnaa Moustafa , Eve M. Schooler , Maruti Gupta Hyde , Jeffrey Christopher Sedayao , Ned M. Smith , S. M. Iftekharul Alam , Satish Chandra Jha
摘要: Systems and techniques for information centric network (ICN) high definition (HD) map distribution are described herein. For example, a vehicle may detect a map tile event (e.g., moving into an area for which the vehicle does not have an up-to-date map tile). The vehicle may transmit an interest packet a name for the map tile via an ICN and receiving the map tile in a data packet sent in response to the interest packet.
-
公开(公告)号:US20190327134A1
公开(公告)日:2019-10-24
申请号:US16456443
申请日:2019-06-28
申请人: Satish Chandra Jha , S.M. Iftekharul Alam , Yi Zhang , Eve M. Schooler , Ned M. Smith , Kathiravetpillai Sivanesan , Venkatesan Nallampatti Ekambaram , Srikathyayani Srikanteswara , Kuilin Clark Chen , Zongrui Ding
发明人: Satish Chandra Jha , S.M. Iftekharul Alam , Yi Zhang , Eve M. Schooler , Ned M. Smith , Kathiravetpillai Sivanesan , Venkatesan Nallampatti Ekambaram , Srikathyayani Srikanteswara , Kuilin Clark Chen , Zongrui Ding
摘要: Systems and techniques for mission critical (MC) push notification mechanism in a high-reliability (HR) information centric network (ICN) are described herein. For example, a node may test network links to other nodes to classify the other nodes into proximate nodes and non-proximate nodes based on a reception metric. The node may then elect a set of leader nodes from the proximate nodes. Here, the set of leader nodes are selected based on link quality between respective leader nodes and non-proximate nodes. The node may detect an MC event and create an ICN data packet that contains data from the MC event. The node may then transmit the ICN data packet to the set of leader nodes that then relay the ICN data packet to the non-proximate nodes.
-
公开(公告)号:US20190327328A1
公开(公告)日:2019-10-24
申请号:US16455442
申请日:2019-06-27
申请人: Ned M. Smith , Srikathyayani Srikanteswara , Kathiravetpillai Sivanesan , Eve M. Schooler , Satish Chandra Jha , Stepan Karpenko , Zongrui Ding , S. M. Iftekharul Alam , Yi Zhang , Kuilin Clark Chen , Gabriel Arrobo Vidal , Qian Li , Maria Ramirez Loaiza
发明人: Ned M. Smith , Srikathyayani Srikanteswara , Kathiravetpillai Sivanesan , Eve M. Schooler , Satish Chandra Jha , Stepan Karpenko , Zongrui Ding , S. M. Iftekharul Alam , Yi Zhang , Kuilin Clark Chen , Gabriel Arrobo Vidal , Qian Li , Maria Ramirez Loaiza
IPC分类号: H04L29/08 , H04L12/24 , H04L12/14 , H04L12/751
摘要: Systems and techniques for information-centric network data cache management are described herein. A demand metric may be calculated for a content item requested from an information-centric network (ICN). A resistance metric may be calculated for each cache node of a set of cache nodes in the ICN based on the demand metric. A topology of the set of cache nodes may be evaluated to identify a transmission cost for each cache node of the set of cache nodes. An influencer node may be selected from the set of cache nodes based on the resistance metric for the influencer node and the transmission cost for the influencer node. The content item may be cached in a data cache of the influencer node.
-
公开(公告)号:US20190327169A1
公开(公告)日:2019-10-24
申请号:US16456687
申请日:2019-06-28
申请人: S. M. Iftekharul Alam , Satish Chandra Jha , Kuilin Clark Chen , Yi Zhang , Venkatesan Nallampatti Ekambaram , NEd M. Smith , Ravikumar Balakrishnan , Gabriel Arrobo Vidal , Kathiravetpillai Sivanesan , Stepan Karpenko , Jeffrey Christopher Sedayao , Srikathyayani Srikanteswara , Eve M. Schooler , Zongrui Ding
发明人: S. M. Iftekharul Alam , Satish Chandra Jha , Kuilin Clark Chen , Yi Zhang , Venkatesan Nallampatti Ekambaram , NEd M. Smith , Ravikumar Balakrishnan , Gabriel Arrobo Vidal , Kathiravetpillai Sivanesan , Stepan Karpenko , Jeffrey Christopher Sedayao , Srikathyayani Srikanteswara , Eve M. Schooler , Zongrui Ding
IPC分类号: H04L12/725 , H04L12/707 , H04L12/801 , H04L29/06
摘要: Systems and techniques for information centric network (ICN) interworking are described herein. For example, a request may be received at a convergence layer of a node. Here, the request originates from an application on the node. A network protocol, from several available to the node, may be determined to transmit the request. The node then transmits the request via the selected network protocol.
-
公开(公告)号:US20190319793A1
公开(公告)日:2019-10-17
申请号:US16456410
申请日:2019-06-28
摘要: In one embodiment, a road side unit (RSU) establishes a data offload session with a vehicle in the vicinity of the RSU based on a session establishment request sent by the vehicle, and stores data received from the vehicle during the data offload session in its memory. The RSU generates storage record information (including identifying information for the RSU) for the stored data, and transmits the storage record information to the vehicle.
-
公开(公告)号:US20190042900A1
公开(公告)日:2019-02-07
申请号:US16141812
申请日:2018-09-25
CPC分类号: G06K9/726 , G06K9/00624 , G06K9/00993 , G06K9/6228 , G06K9/6282 , G06K9/66 , G06T7/11 , G06T7/20 , G06T2207/10016 , G06T2207/20021 , G06T2207/20084 , G06T2207/20221 , H04N19/12 , H04N19/124 , H04N19/167 , H04N19/172 , H04N19/176 , H04N19/44 , H04N19/48 , H04N19/513
摘要: In one embodiment, an apparatus comprises a memory and a processor. The memory stores visual data captured by one or more sensors. The processor detects one or more first objects in the visual data based on a machine learning model and one or more first reference templates. The processor further determines, based on an object ontology, that the visual data is expected to contain a second object, wherein the object ontology indicates that the second object is related to the one or more first objects. The processor further detects the second object in the visual data based on the machine learning model and a second reference template. The processor further determines, based on an inference rule, that the visual data is expected to contain a third object. The processor further detects the third object in the visual data based on the machine learning model and a third reference template.
-
公开(公告)号:US20190140939A1
公开(公告)日:2019-05-09
申请号:US16236474
申请日:2018-12-29
IPC分类号: H04L12/725 , H04L12/851 , H04L12/26 , H04L29/08 , G06K9/62 , H04L12/853
摘要: In one embodiment, an apparatus comprises a network interface and a processor. The processor is to: receive, via the network interface, a plurality of data streams to be routed over a network, wherein the plurality of data streams correspond to sensor data captured by a plurality of sensors; identify, from the plurality of data streams, a set of related data streams that are contextually related; identify a convergence function to be performed on the set of related data streams, wherein the convergence function is for transforming the set of related data streams into a converged data stream that is smaller in size than the set of related data streams; perform the convergence function to transform the set of related data streams into the converged data stream; and route, via the network interface, the converged data stream to one or more corresponding destinations over the network.
-
公开(公告)号:US20110202997A1
公开(公告)日:2011-08-18
申请号:US13094125
申请日:2011-04-26
IPC分类号: G06F21/00
CPC分类号: H04L63/1441 , H04L63/1416 , H04L2463/144
摘要: A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared to a threshold value and an alert is generated if the persistence value is greater than the threshold value. Known safe destinations may be entered into a whitelist.
摘要翻译: 用于检测和减少僵尸网络活动的方法和系统包括在预定时间段内跟踪到目的地地址的连接数。 基于连接目的地地址的时间段数量,将持久性值分配给目标地址。 将持久性值与阈值进行比较,并且如果持续值大于阈值则生成警报。 已知的安全目的地可能会输入白名单。
-
-
-
-
-
-
-
-
-