Search Results

9 Results
for "kanad ghose"
Use Advanced Search
Sort By:

System and Method for Reducing Power and Energy Requirements fo Microprocessors through Dynamic Allocation of Datapath Resources

The present invention is a system and method for reducing the power dissipation and energy requirements of high-performance microprocessors through the incremental allocation and deallocation of units of datapath resources like reorder buffers, physical registers, instruction queues and load-store queues. The allocation and deallocation decisions for...
Published: 1/27/2020   |   Inventor(s): Kanad Ghose, Gurhan Kucuk, Dmitry Ponomarev
Keywords(s): #SUNYresearch, CleanTech, Technology
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Secure Processor for Detecting and Preventing Exploits of Software Vulnerability

The processor described here provides specific hardware support to detect common types of software vulnerabilities or weaknesses that lead to security violations in a computing system. Since 2005, Mitre Corporation has developed a list of such vulnerabilities with Federal support and assistance from other organization. These are described in detail...
Published: 1/17/2020   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technology
Category(s): Technology Classifications > Computers, Campus > Binghamton University

Control Systems and Prediction Methods for IT Cooling Performance in Containment Patent

Containment is becoming a standard modality in data centers today due to its inherent energy efficiency advantages. Cold aisle containment, hot aisle containment, chimney, enclosed racks and rear door heat exchangers are different forms of segregation between cold and hot air streams. The containment industry tends to seal the contained space to address...
Published: 1/17/2020   |   Inventor(s): Husam Alissa, Kourosh Nemati, Bahgat Sammakia, Kanad Ghose
Keywords(s): #SUNYresearch, CleanTech, Technology
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Energy-Aware Load Direction in Server Installations

With the growing concern about energy expenditures in server installations, mechanisms are needed for improving the energy-efficiency of server installations. This technique performs energy-aware load direction via the front-end switches in a server installation to activate and deactivate servers and to operate the active servers at their peak efficiency...
Published: 1/17/2020   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, CleanTech, Technology
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Server Power Management Through Dynamic Job Classification

With the growing concern about energy expenditures in server installations, mechanisms are needed for improving the energy-efficiency of server installations. A technique is proposed for learning the energy-performance characteristics of jobs or phases of jobs as they execute. This information is used to schedule new jobs as well as repetitive jobs...
Published: 1/17/2020   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, CleanTech, Technology
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor

The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed to do. Most systems implement this requirement prior to execution by matching a cryptographic hash of the binary file against a reference hash value, leaving the code vulnerable...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technology
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures

A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host platform and its software environment are potentially compromised, the application may be compromised either through static replacement of the binaries...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technology
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

System and Method for Validating Program Execution at Run-Time

Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues to worsen; novel attacks appear with high frequency and employ increasingly sophisticated techniques. The present technology enables tampering...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technology
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

Authentication of Remotely Executed Program

As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to become truly pervasive, mechanisms are needed to not only authenticate the remote serves but also to authenticate the actual executions of the programs on these servers. The...
Published: 7/15/2016   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technology
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

Search SUNY Technologies

Trending Searches

Latest Technologies