Ming-Hsuan Yang - Sunnyvale CA, US Rui Li - Boston MA, US
Assignee:
Honda Motor Co., Ltd. - Tokyo
International Classification:
G06K 9/00
US Classification:
382103, 382285, 345474
Abstract:
Disclosed is a method and system for efficiently and accurately tracking three-dimensional (3D) human motion from a two-dimensional (2D) video sequence, even when self-occlusion, motion blur and large limb movements occur. In an offline learning stage, 3D motion capture data is acquired and a prediction model is generated based on the learned motions. A mixture of factor analyzers acts as local dimensionality reducers. Clusters of factor analyzers formed within a globally coordinated low-dimensional space makes it possible to perform multiple hypothesis tracking based on the distribution modes. In the online tracking stage, 3D tracking is performed without requiring any special equipment, clothing, or markers. Instead, motion is tracked in the dimensionality reduced state based on a monocular video sequence.
A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided.
Brocade Communications Systems, Inc. - San Jose CA
International Classification:
G06F 15/16
US Classification:
709228, 709223, 709227
Abstract:
A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided.
Brocade Communications Systems, Inc. - San Jose CA
International Classification:
G06F 15/16
US Classification:
709246, 709245, 711201
Abstract:
A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided.
Brocade Communications Systems, Inc. - San Jose CA
International Classification:
G06F 15/16
US Classification:
709228, 709203, 709217, 709227
Abstract:
A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided.
Systems And Methods For Selective Authentication, Authorization, And Auditing In Connection With Traffic Management
James Harris - San Jose CA, US Rui Li - Santa Clara CA, US Arkesh Kumar - San Jose CA, US Ravindranath Thakur - Bangalore, IN Puneet Agarwal - Bangalore, IN Akshat Choudhary - Bangalore, IN
The present invention provides a system and method for authentication of network traffic managed by a traffic management virtual server. A traffic management virtual server may determine that a client has not been authenticated from a request of the client to access a server. Responsive to the request, the traffic management virtual server may transmit a response to the client with instructions to redirect to an authentication virtual server. The authentication virtual server may receive a second request from the client. The authentication virtual server may then authenticate credentials received from the client and establish an authentication session for the client. Further, the authentication virtual server may transmit a second response to redirect the client to the traffic management virtual server. The second response identifies the authentication session. The traffic management virtual server then receives a request from the client with an identifier to the authentication session.
Method And Apparatus For Maintaining Longer Persistent Connections
A hypertext transfer protocol (HTTP) connection between a client terminal and a server includes a client-side connection and a server-side connection. Different techniques are used to extend the persistence of the HTTP connection. These techniques include keeping the server-side connection persistent if the client terminal sends a RESET to the server, keeping the server-side connection persistent but closing the client-side connection if the client terminal sends a RESET or a FIN packet to the server, rewriting a “Connection: Close” header in a request to a “Connection: Keep-Alive,” inserting a “Connection: Keep-Alive” in a header of a request, modifying a “Connection: Close” header in a request, and changing the HTTP version value in a request.
Systems And Methods For Using End Point Auditing In Connection With Traffic Management
James Harris - San Jose CA, US Rui Li - Santa Clara CA, US Arkesh Kumar - San Jose CA, US Ravindranath Thakur - Bangalore, IN Puneet Agarwal - Bangalore, IN Akshat Choudhary - Bangalore, IN Punit Gupta - Bangalore, IN
International Classification:
G06F 15/173 G06F 21/00
US Classification:
726 15, 709224
Abstract:
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.
Nov 2011 to Present Financial Validation InternSkyView Investment Advisors Shrewsbury, NJ Jun 2011 to Aug 2011 Investment Analyst InternStandard Chartered Bank
Jun 2009 to Aug 2009 Managerial TraineeAlibaba Company
Mar 2009 to May 2009 Software Quality Assurance Engineer Intern
Education:
Rutgers University, The State University of New Jersey New Brunswick, NJ 2010 Master of Science in MathematicsZhejiang University of Technology 2006 to 2010 Bachelor of Science in Engineering
Juhua group corporation Quzhou, CN Jun 2008 to Jun 2008 Internship of producing development
Education:
Fairleigh Dickinson University Madison, NJ 2010 to 2012 Master of Science in Pharmaceutical ChemistryZhejiang University of Technology Hangzhou, CN May 2009 Bachelor of Science in Pharmaceutical Engineering
Juhua group corporation Quzhou, CN Jun 2008 to Aug 2008 Internship of producing development
Education:
Fairleigh Dickinson University Madison, NJ May 2012 Master of Science in Pharmaceutical ChemistryZhejiang University of Technology Hangzhou, CN May 2009 Bachelor of Science in Engineering
Sep 2012 to 2000 Pharmaceutical Manufacturing Operator (TEMP)WuXi AppTech
Jul 2009 to Jul 2010 Chemical Research AssistantJuhua group corporation Quzhou, CN Jun 2008 to Aug 2008 Product Development Intern
Education:
Fairleigh Dickinson University Madison, NJ Sep 2010 to May 2012 Master of Science in Pharmaceutical ChemistryZhejiang University of Technology Hangzhou, CN Sep 2005 to Jul 2009 Bachelor of Science in Pharmaceutical Engineering
Name / Title
Company / Classification
Phones & Addresses
Rui Li Principle
Ruiyuan Li Management Consulting Services
6310 Stoneridge Mall Rd Apt# 208, Pleasanton, CA 94588
Rui Li President
ACUPUNCTURE LI'S TCM HEALTH CENTER, PROF. CORP Health/Allied Services
320 Curtner Ave, Palo Alto, CA 94306
Rui X. Li Principal
Uncle Tam's Restaurant Eating Place
29615 Msn Blvd, Hayward, CA 94544
Rui Li
Rui Li DDS Dentists
4111 194 St SW, Lynnwood, WA 98036 (425)8355204
Rui Zhen Li
NEW YORK NAIL SALON, INC Manicures & Pedicures
360 Utica Ave, Brooklyn, NY 11213 (718)7786866
Rui Chun Li
3-GSM, LLC
Seattle, WA 98112
Rui Feng Li President
PANDA GARDEN CHINESE CUISINE, INC Business Services at Non-Commercial Site
48978 Needle Grass Ter, Fremont, CA 94539
Rui Xing Li President
STARLIGHT PIANO & ART CENTER
2914 Judah St, San Francisco, CA 94122
Googleplus
Rui Li
Work:
Oracle Corporation - CRM Developer (2011)
Education:
University of Pennsylvania - Systems Engineering, Renmin University of China - Computer Science and Tech
Rui Li
Work:
Pennsylvania State University - Research Assistant (2007)
Education:
Pennsylvania State University - Geography
Rui Li
Education:
University of Maryland, College Park - Geotechnical Engineering, Tsinghua University - Hydraulic and Hydropower Engineering