Abstract:
Methods and systems for providing template based compression are proxided. In some embodiments, methods for providing template based compression on a message having headers and corresponding values are provided, the methods comprising stripping a first portion of the headers and the corresponding values from the message, filtering a second portion of the headers and the corresponding values from the message based on the contents of a template; substituting a third portion of corresponding values in the message with indices from a dictionary corresponding to the third portion of corresponding values; encoding the indices and a fourth portion of the corresponding values into a packet in a different relative order than the corresponding values are arranged in the message, and transmitting the packet to a recipient.
Abstract:
Methods, systems, and media for forming linear combinations of data are provided. In some embodiments, methods for forming a linear combination of data include: receiving at a device a first codeword, wherein the first codeword comprises a linear combination of at least a first data unit including data, and a second data unit including data; encoding at the device the first codeword and a third data unit including data to form a second codeword, wherein the second codeword includes a linear combination of at least the first data unit, the second data unit, and the third data unit; and transmitting from the device the second codeword.
Abstract:
Systems, methods, and media for outputting data based on anomaly detection are provided. In some embodiments, methods for outputting data based on anomaly detection include: receiving a known-good dataset; storing distinct n-grams from the known-good dataset to form a binary anomaly detection model; receiving known-good new n-grams; computing a rate of receipt of distinct n-grams in the new n-grams; determining whether further training of the anomaly detection model is necessary based on the rate of receipt on distinct n-grams; using the binary anomaly detection model to determine whether an input dataset contains an anomaly; and outputting the input dataset based on whether the input dataset contains an anomaly.
Abstract:
Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a plurality of intermediate nodes when being transmitted from a source node to a destination node are provided, the methods comprising: receiving a packet at one of the plurality of intermediate nodes; determining at the selected intermediate node whether the packet has been sent to the correct one of the plurality of intermediate nodes based on a pseudo random function; and forwarding the packet to the destination node, based on the determining. In some embodiments an intermediate node is selected based on a pseudo random function. In some embodiments, systems and methods for establishing access to a multi-path network are provided.
Abstract:
This process, unique to the flooring industry, includes moulding and then adding dimensional stability and moisture resistance to solid wood flooring by sealing all six sides of each piece. In addition to the moisture resistance and superior dimensional stability, accurate moulding results in optimum fit and therefore less sanding needed at the job site. The final result is a floor with all the desirable characteristics of a jobsite finished floor and the added value of dimensional stability and moisture resistance throughout the life of the floor.
Abstract:
Methods and systems are provided for the encryption of data. In one embodiment, the invention provides a method for performing double encryption and applying whitening while providing a key length of at least 2n where the key of the original cipher is n bits. This is provided in a way that requires less work than three applications of the cipher and avoids a meet-in-the-middle attack to which double encryption by itself would be subject.
Abstract:
Mechanisms for generating documents with confidential information are provided, the systems comprising: a memory; and a first collection of at least of one hardware processor coupled to the memory and configured to: receive from a user device a request for a first document with confidential information; generate a second document, that corresponds to the first document, with at least one token corresponding to the confidential information; transmit the second document to a second collection of at least one hardware processor in a high-trust network that is entitled to access the confidential information; receive from the second collection of at least one hardware processor in the high-trust network a uniform resource locator (URL) corresponding to the first document; and transmit the URL to the user device. In some of these mechanisms, the user device is in the high trust network.
Abstract:
Read Quality of Service in a solid state drive is improved by allowing a host system communicatively coupled to the solid state drive to control garbage collection in the solid state drive. Through the use of controlled garbage collection, the host system can control when to start and stop garbage collection in the solid state drive and the number of NAND dies engaged in garbage-collection operations.
Abstract:
On-SSD-copy using Copy-On-Write (COW) techniques track indirection updates to the copied data without duplicating the data. In one example, a method involves receiving a copy command to copy data from a source LBA to a destination LBA. An entry in a logical-to- physical (L2P) table corresponding to the destination LBA is updated to refer to the same physical address as the source LBA's entry in the L2P table. Flags in the L2P table are updated to indicate that more than one LBA refers to the same physical address. After updating the L2P table and before copying the data, a token is stored to the storage device. After storing the token, but before copying the data, an acknowledgement can be sent to the host to indicate the copy command is complete. A subsequent write to either the source or destination LBAs trigger a copy of the data.
Abstract:
Mechanisms including: receiving a first set of observed spike counts (FSoOSCs) for the spiking cells; determining a set of probabilities (SoPs) by: retrieving the SoPs from stored information (SI); or calculating the SopS based on the SI, wherein the SI regards possible biological states (BSs) of a subject, wherein each of the possible BSs belongs to at least one of a plurality of time sequences (PoTSs) of BSs, wherein each of the PoTSs of BSs corresponds to a possible action of the subject, and wherein each probability in the set of probabilities indicates a likelihood of observing a possible spike count for one of the plurality of spiking cells; identifying using a hardware processor a first identified BS of the subject from the possible BSs based on the FSoOSCs and the set of probabilities; and determining an action to be performed based on the first identified BS.