Quantcast
Channel: Network - IT, Communications & Networking - Columbia Technology Ventures
Browsing latest articles
Browse All 54 View Live

Internet Radio/TV Networks

ms99-06-17 - “Lead Inventor: Henning Schulzrinne, Ph.D. Streaming Video/Audio from Internet Overload Server: Internet is an increasingly being used for delivering multimedia content, such as streaming...

View Article



Dynamically Addressing Circuit Network

m00-004 - Addressing Sources and Destinations of Information in Physical Data Network The network comprising the nodes is interconnected by links. Each Node in the network is assigned a set of...

View Article

Scheduling Interactive Audiovisual Presentations

m00-017 - “Name of the inventor: Hari Kalva Object-Based Audiovisual Presentation Scheduling Incorporated into Server A system and method for scheduling an object-based presentation that can be used as...

View Article

Data Sharing in Intermittently Connected Hosts

m00-018 - “Lead Inventor: Henning Schulzrinne, Ph.D. Wireless Networks with Sporadic Access in Buildings, Subways, Remote Areas Wireless networks may lack coverage inside a building, subways,...

View Article

Dynamic Provisioning for Differentiated Services (DiffServ)

m00-043 - “Lead Inventors: Raymond Rui-feng Liao; Andrew Campbell, Ph.D. Differentiated Services (DiffServ) for Quality-of-Service (QoS) Network Traffic requires Efficient Capacity Differentiated...

View Article


Distributed Computer System using Graphical User Interface Toolkit

m00-070 - “Name of the inventor: Steven Feiner Computer Systems with Distributed User Interfaces Methods and systems for computer systems having distributed user interfaces are described. Interface...

View Article

Malicious Software (Malware) Detection Using Byte Sequence Analysis

m01-039 - “Lead Inventor: Salvatore J. Stolfo, Ph.D. Malware and Viral Software Cause Disruption and Data Loss, Requiring Better Screening Strategies Malware and viral software is a serious problem in...

View Article

Computer System Intrusion Detection by Monitoring Operating System Registry...

m02-018 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Frank Apap, Andrew Honig, Shlomo Hershkop Ph.D., Eleazar Eskin, Ph.D. Windows Operating System Virus Scanners Unable to Detect New Malicious...

View Article


Anomaly Detection and Adaptive Learning for Intrusion Detection Systems (IDSs)

m02-024 - “Lead Inventors: Salvatore J. Stolfo Ph.D., Wei Fan, Ph.D. Intrusion Detection Systems (IDSs) and Credit Card Fraud Detection Systems With increasingly critical data being stored on computer...

View Article


Intrusion Detection and E-Mail Security

m02-030 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...

View Article

Intrusion Detection and E-Mail Security

m02-031 - “Lead Inventor: Salvatore J. Stolfo Ph.D. STV Reference: IR M02-030 & M02-031 Cyber Attacks on Computer Systems on the Rise: The number and sophistication of intrusion attacks on computer...

View Article

"Call Routing in IP (Internet Protocol) Based Telephony Network as PBX...

m01-059 - Telephony services are migrating over an IP-based network. Such services include call routing, voicemail, call forwarding, conferencing. An organization planning to deploy IP-based services...

View Article

Predictive Application Failures in Software Code Errors

m04-065 - “Lead Inventor: Angelos D. Keromytis, PhD. Tech Ventures Reference: IR M04-065, IR M05-081, IR M05-082 Intelligent software application instrumentation for code failure: Software applications...

View Article


Runtime detection and deactivation of malicious software

m04-074 - To detect malicious software behavior, this technology intercepts calls to operating system services and libraries and determines from what locations in memory the call originated. Calls made...

View Article

Detecting Targeted Attacks Using Shadow Honeypots in network security

m05-069 - “Lead Inventors: Angelos Keromytis, Ph.D.; Stylianos Sidiroglou; Kostas G. Anagnostakis Honeypots and anomaly detection systems capable of detecting new types of cumputer attacks: Intrusion...

View Article


Tracking Malicious Executables Using Unsupervised Online Learning

m05-075 - “Lead Inventors: Salvatore J. Stolfo, Ph.D.; Angelos D. Keromytis; Stylianos Sidiroglou Algorithm to detect viruses in email attachements removes vulnerability to zero-day malicious...

View Article

An encryption unit for IP protocol network security

m06-014 - “Lead Inventor: Angelos Keromytis, Ph.D. Problem or Unmet Need: IPsec provides a mechanism to establish a secure end-to-end channel between communicating parties. In an organization, such a...

View Article


Architecture to prevent denial-of-service attacks with stateless multipath...

m06-015 - “Lead Inventor: Angelos Keromytis, Ph.D. Websites and database security from denial-of-service attacks: Overlays networks can be used to mitigate the impact of denial-of-service attacks. They...

View Article

Seamless access point handoff for real-time wireless multimedia communication

m06-027 - The rapidly growing availability of mobile devices has accelerated the development of real-time multimedia communication applications. This growth has resulted in an increased demand for high...

View Article

Intrusion Detections Systems (IDS) for Inhibiting Attacks on Network...

m06-068 - “Lead Inventors: Michael Locasto, Salvatore Stolfo, Angelos Keromytis, and Ke Wang Network Defense Systems Require Reliable, Targeted, Adaptive Response to Evolving Threats One key problem...

View Article

Design of High Performance Session Initiation Protocol (SIP) Aware...

m06-075 - “Lead Inventor: Henning Schulzrinne, Ph.D. Session Initiation Protocol (SIP) Based Systems Require High Speed SIP Packet Processing Session Initiation Protocol (SIP) based systems being...

View Article


Automatic Software Self-healing Using Error Virtualization Rescue Points...

m06-099 - “Lead Inventor: Angelos D. Keromytis Software Programming Errors, Bugs, Require Recovery Mechanisms for Improved Software Quality and Security Software programming errors, referred as...

View Article


Dynamic Byzantine Patching for Software Update Testing

m06-100 - “Name of the inventor: Angelos Keromytis Dynamic Byzantine Patching for Running and Testing Software Updates Online - Dynamic Byzantine Patching provides a framework for testing updates for...

View Article

Algorithm Detects User Misbehavior and Security Threats in Wireless Networks

m06-101 - “Lead Inventor: Xiaodong Wang Wireless Network Device Protocol Make them Susceptible to Protocol Misbehavior and Security Threats The carrier-sense multiple-access with collision avoidance...

View Article

Peer to Peer (P2P) Network System for Secured Paid Content Delivery

m06-105 - “Lead Inventor: Alexander Sherman Peer to Peer (P2P) Network System Security needed for Digital Content Sale Peer to peer (P2P) network systems are not preferred by content providers due to...

View Article


Optical Packet Buffer System is Modular, Scalable and Extensible

m07-011 - “Lead Inventors: Benjamin A. Small and Assaf Schacham Optical Buffers for Optical Packet Switching Networks can Increase Throughput and Efficiency An optical buffer is a device that is...

View Article

Network Bandwidth Capacity Measurement Tool with LinkWidth

m07-029 - Bandwidth Capacity Measurement Tool with Single End TCP Probes • LinkWidth is a tool and method for estimating capacity and available bandwidth using single end controlled TCP packet probes....

View Article

Beamforming and Power Control Systems Providing Feedback for Digital Wireless...

m07-037 - “Lead Inventor: Xiaodong Wang, Ph.D. Digital Wireless Communication Systems Face Multi-Path Fading Challenges Digital wireless communication systems such as wireless routers and mobile phones...

View Article

P2P (Peer-to-Peer) File Sharing for Controlled, Scalable Content Distribution

m07-033 - P2P (Peer-to-Peer) File Sharing Require Exploitation Prevention for Paid Content • P2P file sharing provides a powerful content distribution model by leveraging users' computing and bandwidth...

View Article



Cellular Data Multiplexing Transmission

m07-040 - “Lead Inventor: Xiaodong Wang, Ph.D. Cellular data transmission across multiple antennas: When transmitting data wirelessly over a large distance, the wireless signal can often be corrupted...

View Article

Session Initiation Protocol (SIP) Aware Firewalls Tests for Vulnerability

m07-044 - “Lead Inventor: Henning Schulzrinne, Ph.D. Session Initiation Protocol (SIP)-Based Voice-Over-IP (VoIP) Systems Firewalls Session Initiation Protocol (SIP) is an application layer protocol...

View Article

Exchanging Data between Nodes of Disconnected Networks

m07-074 - “Lead Inventors: Henning G. Schulzrinne, Ph.D., Suman R. Srinivasan Wireless Networks Don’t Reach Everywhere: Wireless networks are widespread today. Many people rely on being connected to...

View Article

SIP-Aware Denial-of-Service Detection and Mitigation Systems

m07-092 - “Lead Inventor: Henning Schulzrinne, Ph.D. Hackers use Denial-of-Service Attacks Against VoIP and SIP Phones : Denial-of-service (DoS) is an attempt by attackers to prevent legitimate users...

View Article


Integrated Enterprise Network Security Management

m07-096 - “Lead Inventor: Angelos D. Keromytis, Ph.D. Network Security Firewalls, User Password Protection Inadequate: Current network security generally depends on a firewall to protect an internal...

View Article

Power Control Strategy for MIMO with OFDM Wireless Communications

m07-101 - “Lead Inventors: Xiaodong Wang, Ph.D., Filippo Zuccardi Merli MIMO with OFDM Communication for Wireless Systems: In the last few years multi-input multi-output (MIMO) communication has...

View Article

Peer-to-Peer Video Streaming for Set-Top Based IP Network

m07-102 - “Lead Inventor: Henning Schulzrinne, Ph.D. Streaming Movies and Videos Uses Large Bandwidth: Streaming videos and movies over the Internet are increasingly becoming popular. Devices such as...

View Article


Detecting Theft-of-Service in SIP-based Systems

m07-103 - “Lead Inventor: Henning Schulzrinne, Ph.D. Theft of Service Prevention for Session Initiation Protocol Services: Session Initiation Protocol (SIP) based Voice-over-IP (VoIP) services are more...

View Article


Signaling Compression for Push-to-Talk Over Cellular

m08-003 - “Lead Inventors: Andrea Forte, Henning Schulzrinne, Ph.D. Session Initiation Protocol for Push-To-Talk Over Cellular Has Message Size Limitations: There are two issues in using Session...

View Article

Fair and efficient bandwidth allocation for peer-to-peer networking

m08-093 - Peer-to-peer (P2P) networks allow users to share content directly without a centralized server by leveraging each user’s ability to both upload and download files. In current P2P models,...

View Article

Using Conference-Servers for SIP-based Vertical Handoff Technique for...

m08-094 - “Lead Inventor: Henning G. Schulzrinne, Ph.D. Transferring a Call Between Cellular and Wireless Networks Without Interruption VoIP technology has been popular with landline phones to allow...

View Article

SIP Server Overload Mechanisms

m09-021 - “Lead Inventors: Henning Schulzrinne, Ph.D., Charles Shen Preventing Congestion Collapse of Session Initation Protocol Servers Session Initiation Protocol (SIP) is a protocol for establishing...

View Article


Real-time video chat application performance measurement tool

m09-086 - Capture-to-display latency (CDL) and frame-rate are two metrics that provide quick insights into the performance of real-time video applications such as video chat and conferencing. This...

View Article

Anonymization and privatization of sensitive network data

m09-088 - “Lead Inventor: Salvatore J. Stolfo Ph.D. Computer network tracing using new method to anonymize, privatize and protect data: Computer network traces, i.e., copies of network packets or...

View Article


"Voice over IP for air traffic communications "

m10-043 - “Lead Inventors: Henning Schulzrinne, Ph.D.; Xiaotao Wu, Ph.D.; Supreeth Subramanya Air traffic controller system using voice over IP replaces analog hardware: The Federal Aviation...

View Article

Protecting running multithreaded applications from races without a restart

m11-009 - Large software applications such as web and database servers employ multiple threads of execution in order to facilitate development or improve performance. Multithreaded software often...

View Article


Low-Voltage Optical Phase Modulators and Tunable Filters

cu12018 - Optical information processing and transmission systems afford significant speed and bandwidth advantages compared to electrical systems. These systems rely upon components such as spectral...

View Article

Compact high-power transmitter for long-range high-speed millimeter-wave...

cu15078 - The technology is a digital polar phased array transmitter architecture for wireless communication in the millimeter-wave spectrum (30-300 GHz). Using multiple stacked digital-to-analog...

View Article

Efficient neighbor discovery for ultra-low power wireless devices

cu15281 - Object tracking can be achieved by affixing ultra-low power wireless transmitters (nodes) to desired inventories, where neighboring nodes then communicate to exchange information. To minimize...

View Article

Client-Server Interaction in Interactive Communications

ms98-02-17 - Client-Server Interaction in Communication Systems These communication systems are based on the MPEG-4 standard. The system and method for communicating command information between a...

View Article


Network Switch for Failure Restoration

ms98-03-26 - “Name of the inventor: Thomas Stern Restoring Network Switch Failures: A system and method for automatically restoring a network which contains a node with a failed switch are described....

View Article

Browsing latest articles
Browse All 54 View Live




Latest Images