Search Results

8 Results
for "kanad+ghose"
Use Advanced Search
Sort By:

System and Method for Reducing Power and Energy Requirements fo Microprocessors through Dynamic Allocation of Datapath Resources

System and method for reducing the power dissipation and energy requirements of high-performance microprocessors through the incremental allocation and deallocation of units of datapath resources Background: Modern, high-performance microprocessors use sophisticated instruction scheduling mechanisms and pipelines designed to reorder the startup...
Published: 5/13/2021   |   Inventor(s): Kanad Ghose, Gurhan Kucuk, Dmitry Ponomarev
Keywords(s): #SUNYresearch, CleanTech, Technologies
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Control Systems and Prediction Methods for IT Cooling Performance in Containment

Control systems and prediction methods for it cooling performance in containment systems by effectively controlling airflow Background: Containment is becoming a standard modality in data centers today due to its inherent energy efficiency advantages. Cold aisle containment, hot aisle containment, chimney, enclosed racks and rear door heat exchangers...
Published: 9/28/2023   |   Inventor(s): Husam Alissa, Kourosh Nemati, Bahgat Sammakia, Kanad Ghose
Keywords(s): #SUNYresearch, CleanTech, Technologies
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Energy-Aware Load Direction in Server Installations

Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their peak efficiency levels. Technology Overview: Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their...
Published: 4/11/2024   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, CleanTech, Technologies
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Server Power Management Through Dynamic Job Classification

This tool schedules new jobs and repetitive jobs with the server characteristics using the most energy-efficient configuration for realizing the performance goal Technology Overview: With the growing concern about energy expenditures in server installations, mechanisms are needed for improving the energy-efficiency of server installations....
Published: 4/11/2024   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, CleanTech, Technologies
Category(s): Technology Classifications > Clean Energy, Campus > Binghamton University

Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor

A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty Background: The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 12/29/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures

A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes. Background: A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 4/10/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

System and Method for Validating Program Execution at Run-Time

A technology that enables the detection of tampering of a program as the program executes for security applications. Background: Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 4/23/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

Authentication of Remotely Executed Program

A mechanism for authenticating remote executions on a server in a distributed environment, validating what is executed at the server on behalf of the client Background: As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to...
Published: 7/27/2023   |   Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University

Search SUNY Technologies

Trending Searches

Latest Technologies