Abstract:
In one embodiment, a computer program distributed by a first party is provided with: code to determine whether a second party has defined a custom analysis of test and measurement (T&M) data and then provide access to the custom analysis via a graphical user interface (GUI); and code to, upon a user's selection of the custom analysis via the GUI, 1) execute custom code provided by the second party, and 2) display the custom analysis within a window of the GUI, in a format dictated by the execution of the custom code.
Abstract:
A refrigeration system/cycle includes two or more refrigeration stages, in which one or more of the warmer stages provide(s) cooling to partially compensate for heat leakage that would otherwise leak to the colder stage(s). The refrigeration system includes a single heat sink or multiple heat sinks. The refrigeration cycle can include a single cooling load or multiple cooling loads. The refrigeration system can be a cryogenic refrigeration cycle. The flow of working fluid can be DC (direct-current, continuous and uni-directional) or AC (alternating-current and oscillating). The refrigeration system can include Double-Cycle cooling action. The refrigeration system can include one (or more) thermal storage unit(s) (TSUs).
Abstract:
A rules runtime engine for scheduling and concurrently processing of rules. The engine efficiently runs a large number of rules in a parallel fashion. This is accomplished by authoring rules in a rule definition language, passing these rules through the translator for communication to the runtime engine and, scheduling and concurrently processing the translated instructions using the runtime engine. The engine also receives configuration data that instantiates the instructions thus, giving form to a living set of rules.
Abstract:
A service control processor includes a plurality of service feature processors each corresponding to selected telephone service, and a plurality of call processing records, each corresponding to a customer of a service provider. The customer call processing records specify services subscribed to by the caller. A feature manager processor manages call processing and the implementation and execution of services by managing the individual service feature processors. In an alternative embodiment, multiple feature manager processors are included, and a trigger manager selects between them in response to call processing triggers.
Abstract:
A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine. Also, the accomplishment of exploits may be detected by tracing events occurring on a machine after visiting a network site and analyzing the traced events for illicit behavior. Alternatively, site redirections between and among uniform resource locators (URLs) may be explored to discover relationships between sites that are visited.
Abstract:
A method and system for detecting that a software system has been infected by software that attempts to hide properties related to the software system is provided. A detection system identifies that a suspect operating system has been infected by malware by comparing properties related to the suspect operating system as reported by the suspect operating system to properties as reported by another operating system that is assumed to be clean. The detection system compares the reported properties to the actual properties to identify any significant differences. A significant difference, such as the presence of an actual file not reported by the suspect operating system, may indicate that the suspect storage device is infected.
Abstract:
A rules definition language the authoring rules for concurrent processing. The RDL includes statements that facilitate efficient use of computer resources by allowing a rule to be broken down into one or more instructions, and processing these instructions asynchronously to provide more efficient use of the computer resources. Once processed into the instructions, results thereof can be passed among the instructions to facilitate process completion of the rule.
Abstract:
The valve includes a supply portion, a delivery portion and an intermediate fluid chamber; a poppet member is positioned within the fluid chamber and is adapted to move within the chamber, the poppet including a conical seating surface and a rim portion, the rim portion having openings therethrough into the open interior of the poppet, allowing for forward fluid flow through the poppet. A delivery poppet seat and a supply poppet seat are defined at opposite ends of the fluid chamber. The delivery poppet seat is configured so that when the rim portion of the poppet contacts the delivery seat, fluid flow in the forward direction is permitted. The supply poppet seat is configured such that when the conical seating surface of the poppet member contacts the supply poppet seat, backflow through the valve is substantially prevented.
Abstract:
A method and apparatus for decoding data encoded in the horizontal overscan portion of a video signal. A video data detector is configured to decode data encoded in a video signal in a first type of video signal format, such as NTSC. When the detector receives the video signal, it enters a “fast acquisition” loop in which it attempts to decode a sequence of valid data from several consecutive frames of the video signal. If the detector cannot decode a sequence of valid data from the consecutive frames of the video signal, the detector is reconfigured to decode data encoded in the video signal in a second type of video signal format, such as PAL. The detector then attempts to decode a sequence of valid data from the next several consecutive frames of the video signal. If the detector is unable to decode a sequence of valid data from the consecutive frames, the detector is reconfigured for the first type of video signal format and the above process repeats. If the detector decodes a sequence of valid data in the several consecutive frames of the video signal, the detector enters a “controlled persistence” loop. In the controlled persistence loop, the detector continues to decode data until it fails to decode valid data from a series of consecutive video frames. When the detector fails to decode data from a series of consecutive video frames, the detector reenters the fast acquisition loop.
Abstract:
A system for interfacing a service activation controller and a service management system allows a remote system to generate, update and delete call processing records and to create, update and delete tables. A provisioning message with one or more requests is sent to the service management system to process each request in the message, which identifies a unique logic template and one or more data templates and includes customized call variables data for inserting into a service record created from the template or updating an already created record. The resulting service record is activated by inputting the request to an integrated service point.