• Computational Sciences & Engineering
Displaying 31-40 of 180 documents Export Results

Computed Structure Clustering Disclosure Number 201403238 Technology Summary The invention relates to software and more specifically to software for vetting other software. Rapid clustering of software and software fragments based on computed control flow for detection of potential malicious content, copyright infringement, or supply chain violations. Inventor PROWELL, STACY J Comput…

Proactive Phishing Defense and Organizational Threat Assessment Disclosure Number 200902354 Technology Summary Our work identifies incoming phishing attacks which can be used to train defensive measure and allows an organization to detect whether it is being targeted or simply receiving an Internet-wide phishing attack. Further, the organization can pollu…

: Fact Cards
: Phishing, Science, Measure...

Enhanced Methods for Normalizing Data for Analysis of Search Results Enhanced Methods for Normalizing Data for Analysis of Search Results Disclosure Number 201102583 Technology Summary This disclosure tracks the emergence of an identified technology from initial discovery (via original scientific and conference literature), through critical discoveries (…

System for Anomaly Detection using Data-Driven Probabilistic Modeling System for Anomaly Detection using Data-Driven Probabilistic Modeling Disclosure Number 201102687 Technology Summary With this technology, we propose a systematic method for constructing a potentially very large number of complementary anomaly detectors from a single probabilistic mode…

: Fact Cards
: Assembly, model, system...

Global Identification for Unstructured Disparate Data Artifacts Disclosure Number 201102719 Technology Summary Many current data structures/databases consist of large collections of electronic documents, or articles, from different sources, both commercial and in-house. An individual document, for example a journal article, may consist of a number of item…

Two-Factor Authentication Provisioning to Secure Access to Applications Cloud Two-Factor Authentication Provisioning to Secure Access to Applications Cloud Disclosure Number 201102726 Technology Summary In today s world of networked application and their migration to cloud computing, service provisioning as a set of actions to prepare appropriate systems…

Secure Token Authentication and Encrypted Communication from Quantum Random Numbers Secure Token Authentication and Encrypted Communication from Quantum Random Numbers Disclosure Number 201102728 Technology Summary We present a novel combination of true random number generator devices with cryptographic and authentication systems. Using true random numbe…

Global Identification e-Infrastructure and Data Infrastructure Serving Scientific Work Global Identification e-Infrastructure and Data Infrastructure Serving Scientific Work Disclosure Number 201202821 Technology Summary Many current data structures/databases consist of large collections of electronic documents, or articles, from different sources, both …

Bag of Gaussians (BoG) Model for Mapping Settlements Disclosure Number 201202900 Technology Summary The invention relates to identification of objects in imagery and more specifically to a method of improving accuracy and speed of identification. Per-pixel (or single instance) based classification schemes which proven to be very useful in thematic classif…

High-Efficacy Modeling of Human Perceptual Similarity Opinions Disclosure Number 201202916 Technology Summary The invention relates to human nature studies and more specifically to a novel graphical user interface (GUI) that facilitates high-efficacy collection of perceptual similarity opinions of a user in an effective and intuitive manner. The GUI prese…

: Fact Cards
Results: Previous12345678910111213... Next
Search Home Help About InSpire